/ Most Commented

Three Reasons Why It Makes Sense to Deploy DNSSEC Now

As many of you may know, today .ORG announced that all of its 8.5 million domains are now able to be fully DNSSEC signed - the largest set of domain names in the world so far that has access to this key security upgrade. .. The widespread publicity that the Kaminsky bug got around the world vindicated a decision made in several companies to invest time, effort and money into deploying DNSSEC. The community was split on the value of the DNSSEC effort -- many thought the deployment was quixotic, while a few others thought it was appropriate. more

DNSSEC Becomes a Reality Today at ICANN Brussels

Attendees at the public ICANN meeting in Brussels today heard from over two dozen companies that have implemented or are planning to support DNSSEC, the next-generation standard protocol for secured domain names. It is clearer than ever before that DNSSEC is becoming a reality. more

Google’s “Deeply Disturbing Invasion of Privacy” Being Investigated by Connecticut AG

What happens to companies when they get too big for their own good? Do they inadvertently do things that potentially harm our privacy (think Facebook)? Or, do they simply make mistakes that violate our privacy? Well, last month Google revealed that its Street View cars "mistakenly" captured content flowing over wireless networks -- a potential invasion of privacy. more

Multiple (Even Random or Garbled) Domain Names to Bypass Spam Filters Not a Violation

The California Supreme Court issued its opinion in Kleffman v. Vonage, a case certified from the Ninth Circuit. The California Supreme Court held that the transmission of "commercial e-mail advertisements from multiple domain names for the purpose of bypassing spam filters" does not violate California's spam statute. more

FCC: We Will Regulate Broadband

Since the dust has settled from a stinging defeat in federal court, the FCC has decided to move on its own to settle the broadband regulation dispute. With a 3-2 vote the commission issued a Notice of Inquiry that would set the stage for more regulatory authority of broadband. It seems ironic that the motivating factor was the court case brought by Comcast in Federal District Court to immobilize the FCC's efforts to sanction the service provider from throttling Bit Torrent, file sharing customers. more

VPN Security Flaw Makes IP Address of Users Using IPv6 Easily Traceable

Duncan Geere reporting in Wired: "Since the slow introduction of internet monitoring systems around the world began, more and more people have attempted to preserve their privacy by signing up for VPN services like the Pirate Bay's Ipredator and Pirate Party offering Relakks. But it turns out that there's a gaping security flaw in these services that allows individual users to be identified..." more

A Modest Proposal for ICANN

When it comes to accountability, ICANN would rather be compared to other U.S. nonprofit companies than to the regulatory bodies it more closely resembles. If they truly wish to be treated like a nonprofit, rather than a regulator, there is a very simple solution: make all contributions strictly voluntary. more

When Having a Voice Isn’t Enough

In Brussels on Friday, an esteemed panel of experts got together to discuss the challenge of improving ICANN's accountability. It's just too bad nobody from ICANN came by to hear it. ... While their prescriptions varied widely, the panelists were remarkably similar in their diagnoses - namely, that ICANN has yet to meet the fundamental challenge of making its board and staff accountable and answerable to the community that it is intended to serve. more

Top Level Domains and a Signed Root

With DNSSEC for the root zone going into production in a couple of weeks, it is now possible for Top Level Domain (TLD) managers to submit their Delegation Signer (DS) information to IANA. But what does this really mean for a TLD? In this post we're going to try to sort that out. more

BP and Incident Response: How Well Do Oil and Security Mix?

BP and the Oil Industry are taking a lot of heat these days - much of it rightly so. Moving beyond the drama and evaluating the overall response of BP and others reinforces much of what is taught in incident response training and preparation... by showing the outcomes when one does not respond well. This is probably the most important incident that the responders involved will deal with in their professional lives. For those of us working to protect Internet Infrastructure and resources there are useful lessons as we consider what is happening in the Gulf of Mexico and their response effort. more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more

Corporate TLDs - Why Keeping Mum Seems to Be the Order of the Day

Global brand protection powerhouse MarkMonitor recently released survey results revealing the intentions of their corporate clients with respects to new gTLDs. After reading the report, it's fair to say that I'm not surprised by the results, but continue to be frustrated by them. Where are all of these forward thinking and revolutionary online marketers and brand managers? Are they so unaware of the opportunity that has been placed before them or are they just being very savvy? more

Today Marks a Giant Step Towards DNSSEC Deployment

The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more

Brits Targeted by 3.7 Billion Phishing Scams in Past 12 Months

More than 420,000 scam emails are sent every hour in the UK according to a report published by Card Protection Plan Limited (CPP). The study estimates that Britons were targeted by 3.7 billion 'phishing' emails in the last 12 months alone. And a quarter of people admit to falling victim to e-fraudsters, with the average victim losing over £285 each. more

IPv6 for the Masses

As the first semester of 2010 comes to a close, the IPv4 address pool has dropped to 6%. Another year and we will probably celebrate (mourn?) the end of the IANA IPv4 pool. As Vint Cerf commented on the topic of depletion in an e-mail to Bob Hinden: 'Sic transit Gloria Mundi'. The view of an abyss or the fear of judgment day always focuses attention and as a result IPv6 adoption is finally picking up speed. The Google invitational IPv6 Conference in Mountain View clearly illustrated the point. more