/ Most Viewed

ICANN Releases New gTLD Applicant Guidebook ...Would Apple Need Permission from China for .MAC?

The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more

The Spamhaus Distributed Denial of Service - How Big a Deal Was It?

If you haven't been reading the news of late, venerable anti-spam service Spamhaus has been the target of a sustained, record-setting Distributed Denial-of-Service (DDoS) attack over the past couple of weeks... Of course, bad guys are always mad at Spamhaus, and so they had a pretty robust set-up to begin with, but whoever was behind this attack was able to muster some huge resources, heretofore never seen in intensity, and it had some impact, on the Spamhaus website, and to a limited degree, on the behind-the-scenes services that Spamhaus uses to distribute their data to their customers. more

Internet Bigger Than Agriculture or Energy Sectors - Importance of R&E Networks

Several months ago McKinsey did a very interesting study on the economic value of the Internet. They pointed out that Internet in the G8 countries as well as Brazil, China, India, South Korea, and Sweden is now bigger than agriculture or energy. The Internet represents 3.4% of GDP and accounted for 21 percent of GDP growth over the last five years among these developed countries and as Vint Cerf pointed out in his blog created 2.6 jobs for every one lost. more

Behind the Smoke Screen of Internet and International Infrastructure

In my recent write-up I start by discussing some recent threats network operators should be aware of, such as recursive DNS attacks. Then, a bit on the state of the Internet, cooperation across different fields and how these latest threats with DDoS also relate to worms and bots, as well as spam, phishing and the immense ROI organized crime sees. I try and bring some suggestions on what can be done better, and where we as a community, as well as specifically where us, the "secret hand-shake clubs" of Internet security fail and succeed. Over-secrecy, lack of cooperation, lack of public information, and not being secret enough about what really matters. more

Russia Says It Has Successfully Tested a Country-Wide Alternative to the Global Internet

Russia's Ministry of Communications has announced that it has successfully tested a country-wide alternative to the global Internet and that general users did not notice any changes. more

2023 Review of the Online Brand Protection Market

Having been involved in this sector for over fifteen years now, the rate of change in the market dynamics continues to surprise me - from its early years when MarkMonitor and NetNames clearly led the space for several years, then seeing well-funded startups such as Yellow Brand Protection and Incopro challenge that, followed by a period of heavy M&A, it is now extremely diverse. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

A Single Price Index for Domain Names Is Misleading

Having a single price index for the domain name industry would be worse than useless. Such an index is presented in a recent study by Thies Lindenthal. The index is intended to be a benchmark for domain owners and investors. But it's out of line with other studies and the common sense of how a market operates. A much better barometer to follow is average prices for groups of domain names with similar characteristics. more

IPv6: Penny Wise and Pound Foolish

The theory put forward by the IETF was simple enough... while there were still enough IPv4 addresses, use transition technologies to migrate to dual stack and then wean IPv4 off over time. All nice and tidy. The way engineers, myself included, liked it. However those controlling the purse strings had a different idea. more

Quake Damage in Japan

The 8.9-magnitude earthquake in Japan rocked the northeastern portion of the coast. The quake was the strongest to hit Japan in at least a century, sending a tsunami that flooded northern towns and also reached portions of the United States, including Hawaii. The quake was followed by a 7.1-magnitude aftershock. Impact on Internet connectivity... Japan’s Internet performance seemed to have emerged largely unscathed, but concerns continue for the telecommunications infrastructure as the country struggles to meet power demands in a state-of-emergency. more

Blockchain Technology Can Solve Some of Africa’s Problems

Lately, the word blockchain is gaining a lot of attention from businesses, investors and governments, especially around how it could transform how we do business today. As the world looks up to Blockchain technology for radical transformations in many industries and sectors, I want to take a look at how it could help governance in Africa.
The African continent is plagued with corruption, bad governance, mismanagement and lack of accountability. more

Day 30: Kaminsky DNS Bug Disclosure

In a highly anticipated presentation, Internet security researcher Dan Kaminsky today gave details of the much talked about Domain Name System (DNS) vulnerability issue which has been intensely covered since it was publicly announced a month ago on Jul 8th. Although original plans entailed keeping the bug details undisclosed for 30 days in order to allow for necessary security patches to be implemented around the world, details of the bug were eventually leaked-and-confirmed 13 days after its public announcement. Even so, just hours ago in jam-packed ballroom during the Black Hat conference, Kaminsky delivered his 100-plus-slide presentation detailing the DNS flaw that, if exploited, could potentially "destroy the Web". more

Country and Regional TLDs Are Vital in Supporting Online Linguistic Diversity, Study Finds

A study conducted by the Oxford Information Labs in collaboration with Council of European National Top-Level Domain Registries (CENTR), finds that the role of country and regional TLDs is imperative in supporting diversity in global online linguistic. more

Bloomberg on Netflix as World’s Biggest User of Cloud Computing

Netflix is arguable one of the world's biggest users of cloud computing, renting all its computing power from Amazon Web Services, the cloud division of Amazon.com, which runs its own video-streaming service that competes with Netflix. Ashlee Vance from Bloomberg reports. more

Business Case for IPv6 - Part 2

In my previous blog on the topic, I stated that the business case supporting the IPv4 roll-out in the late 90s was the Internet. Although IP depletion will slowly become a reality, the chances are that due to mitigating technologies such as NAT and DNS64, it may take quite a while before organizations in the developed economies will get serious about IPv6. So where should we look to find a business case for IPv6? more