Hot Topics:   Cybersecurity    Domain Names    Wireless    Broadband    Telecom    Access Providers    Internet Governance   

Featured Blogs

The UN Panel on Digital Cooperation: An Agenda for the 2020s

Wolfgang Kleinwächter The UN Panel on Digital Cooperation presented last week in New York its final report, and an old question is back on the international agenda: Could the global Internet be ordered by a reasonable arrangement among stakeholders which would maximize the digital opportunities and minimize the cyber risks by keeping the network free, open and safe? more

Cuba's New WiFi Regulations – Good, Bad or Meh?

Larry Press Soon after ETECSA began rolling out WiFi hotspots for Internet access, people began linking to them from homes and community street nets. These connections and importing the WiFi equipment they used were illegal, but generally tolerated as long as they remained apolitical and avoided pornography. Regulations passed last month legalized some of this activity in a bid to boost connectivity by allowing Internet access from homes and small private businesses like restaurants and vacation rentals that are located close enough to a hotspot to establish a WiFi connection. more

Have We Reached ‘Peak Telecom’ and What Does This Mean for 5G

Paul Budde "Peak telecom" is described as the maximum point of expansion reached by the traditional telecommunications industry before the internet commoditized the industry to a utility pipe. I had to think of this when I read the recent outcomes of the famous Ericsson Consumer Lab survey. The company used the result of the survey to counteract market criticism regarding the viability of the telco business models in the deployment of 5G. more

Network Protocols and Their Use

Geoff Huston In June, I participated in a workshop, organized by the Internet Architecture Board, on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions of the discussions that took place at this workshop. ... In this first part of my report, I'll report on the case studies of two protocol efforts and their expectations and deployment experience. more

As a Service?

Bob Frankston I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

All Domain Name Professionals – Now Is the Time for a Portfolio Review

Elisa Cooper As we move further into the summer months and the demands made upon domain professionals typically ease, now is the ideal time to review domain name portfolios. And technology solutions can greatly automate this process. Ensuring that portfolios are pared, appropriate levels of security are implemented, and domains point to relevant content are all key areas upon which to focus. more

State Department Should Return to Its Knitting

Anthony Rutkowski Having researched and written about the 100 year history of U.S. State Department's institutional machinations in the telecom/cyber sector, taught law school graduate courses, and worked with its bureaus and staff over the past 45 years, the latest twists and turns seem to repeat past mistakes. The fundamental problem is that the U.S. is the only country whose Foreign Ministry is given a significant role and engaged in telecom and cyber matters in global venues. more

Happy Birthday BGP

Geoff Huston The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

Can ICANN Survive Today’s Global Geo-Political Challenges Under Its Existing Narrow Mandate?

Khaled Fattal Recently, the Presidents of four Latin American countries slammed ICANN over its .amazon domain name decision. This added to a long list of geo-politically infused challenges which ICANN needed to render final decisions on after all delay tactics or deferments had already been fully exhausted. It is clear that ICANN is facing unprecedented challenges as it tackles issues that go beyond its current narrow mandate. more

Afnic Reveals the Results of Its Study of the World’s Domain Name Market in 2018

Loic Damilaville A new publication of Afnic deals with the overall trends of the Domain Name market in 2018. The publication of ICANN statistics as at the end of last year allows a quantified assessment of 2018, a period of moderate upswing after the "set-down" of 2017. The data on which this study is based come from ICANN reports from information provided by registries in certain frameworks. more

Squirrels Are the Number One Culprit for Animal Damage to Aerial Fiber

Doug Dawson These cute rodents are the number one culprit for animal damage to aerial fiber. To a lesser degree, fiber owners report similar damage by rats and mice. Squirrels mainly chew on cables as a way to sharpen their teeth. Squirrel teeth grow up to 8 inches per year and if squirrels aren't wearing their teeth down from their diet, they look for other things to chew. more

Hongyun Project - China's Low-Earth Orbit Broadband Internet Project

Larry Press Last December, State-owned China Aerospace Science and Industry Corporation (CASIC) launched the first experimental Hongyun (rainbow cloud) Project satellite, and they began testing it in March. The 247 kg test satellite is in orbit at an altitude of around 1,100 km, and they plan to launch four more test satellites this year and begin operating with a 156-satellite constellation in 2022. more

ICANN and Voodoo Economics in Wonderland

Greg Thomas The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more

Trade War Is Turning Into a Technology War

Paul Budde President Trump knows that in the current trade war, the Huawei issue is perhaps one of the most important issues for the Chinese government. It directly undermines the Chinese prestige and the ban create global anxiety. This is resulting in discussions in many countries, assessing their relationship with China. It highlights the domination of the Chinese in telecoms manufacturing, but at the same time, it opens up other discussions in relation to Chinese dominance and influence. more

Does China’s Digital Silk Road to Latin America and the Caribbean Run Through Cuba?

Larry Press China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more

News Briefs

Notorious Hacker Group XENOTIME Expands Its Targeting Beyond Oil and Gas to Electric Utility Sector

XENOTIME, the notorious group behind what is regarded as the most dangerous malware targetting industrial control systems has expanded its targeting beyond oil and gas to the electric utility sector. more

Greece Announces Plans to Install Free Public Wi-Fi Nationwide

Greece's Department of Telecommunications and Post (EETT) has announced plans to install 3000 public Wi-Fi hotspots around the nation beginning next year in both open-air and enclosed public spaces. more

Use of DNS Firewalls Could Have Prevented More Than $10B in Data Breach Losses Over the Past 5 Years

New research from the Global Cyber Alliance (GCA) released on Wednesday reports that the use of freely available DNS firewalls could prevent 33% of cybersecurity data breaches from occurring. more

Meeker Report: Global Internet User Growth Slowing Down

Mary Meeker delivered her Internet Trends Report, tech communities most anticipated slide deck at the Code Conference 2019 in Arizona today. more

Google Reported to Be Pushing Trump Administration for Exemption on Huawei Ban, Citing Security Risk

Reports on Friday said Google has indicated that the Huawei ban poses security risks for US consumers and is asking the Trump administration for an exception. According to a report by the Financial Times, Google executives are warning the ban will force China to develop its own Android software independent from Google and thus leading to security flaws and bugs. more

Domestic Internet of Russia, Iran Far Deeper Kind of Fragmentation, More Physical Than Seen Before

The internet fragmentation practiced by various countries have, for the most part, been alternations to the information flows on top of the internet architecture, not the architecture itself. China, for instance, still relies on the global DNS and is yet to unplug from major internet exchange points. more

A New Project Called Handshake Wants to Decentralize DNS, Says It's Unlike Previous Attempts

An entity called the Handshake Network claims its newly developed open source project offers advantages over the traditional naming and signature systems. more

Loon Balloons Restore Internet After a Massive Earthquake Strikes Remote Parts of Peru

On Sunday, when a magnitude 8.0 earthquake struck remote parts of Peru’s Amazon region, at the request of the government of Peru and Telefónica, Alphabet re-directs a group of its Loon balloons to the impacted area to restore Internet access. Within 48 hours, people on the ground had wireless broadband communication, reports Alphabet. more

Critics Say FCC's New Report Declaring US Broadband Healthier Than Ever is Based on Flawed Data

The US Federal Communications Commission (FCC) released its 2019 Broadband Deployment Report on Wednesday stating the digital divide is shrinking substantially, and more Americans than ever have access to high-speed broadband. more

Huawei Files Motion in US Federal Court Calling Ban Unconstitutional, an Assault on Human Rights

Huawei has filed a legal motion in the United States federal court calling for the ban to be declared unconstitutional and deemed an assault on global human rights. more

ICANN's Recent .amazon Decision Denounced by Presidents of Peru, Colombia, Ecuador and Bolivia

The presidents of Peru, Colombia, Ecuador and Bolivia have criticized the recent ICANN decision to grant global retailer Amazon the rights to the .amazon top-level domain. more

Microsoft Becomes the Latest Company to Join the Internet Society’s MANRS Initiative

Microsoft has joined the Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society (ISOC) with the primary objective is to reduce the most common threats to the Internet's routing system. Microsft is the latest of a number of industry giants around the world - including Oracle, GÉANT, and Comcast - to join MANRS. more

SpaceX Succeeds in Launching Its First Full Batch of Starlink Internet Satellites

SpaceX on Thursday successfully launched 60 Starlink satellites with its Falcon 9 rocket from Space Launch Complex 40 at Cape Canaveral Air Force Station, Florida. more

UK Announces $28M Fund for Army Cyber Operations Centers

The UK Ministry of Defence has announced a £22m ($28 million) fund for the development of British Army cyber operations centers across the country. more

Baltimore Gets Hacked: Main Computer Systems Crippled, Experts Estimate Months to Recover

On May 7, hackers breached parts of the computer systems that run Baltimore's government, taking down essential systems such as voice mail, email, a parking fines database, payment systems used for water bills, property taxes, real estate transactions and vehicle citations. more

US Huawei Ban Threatens Internet Access in Rural Areas, Some Providers May Fold

Much of rural America with very low population density, depends on small wireless carriers for their internet access as AT&T, T-Mobile and other large providers have no interest in providing services. more

DDoS Storm Is Coming, Warn Researchers Noting an 84% Surge in the First Quarter of 2019

The number of DDoS attacks during the first three months of 2019 increased by 84%, compared with the previous quarter. more

Qualcomm’s Licensing Practices Are Illegal, U.S. Judge Rules

A U.S. district court judge rules that Qualcomm violated anti-trust laws and has ordered the chip maker to change some of its licensing and negotiation practices. more

Microsoft Sees Serious Appetite for Revised Privacy Laws in US, Says It's Time to Match EU's GDPR

With the first anniversary of the European Union's General Data Protection Regulation (GDPR) approaching in just a few days, Microsoft's Corporate Vice President and Deputy General Counsel, Julie Brill says GDPR has been an important catalyst for progress in privacy protection around the world. more

NGOs, Academics Warn Against EU’s Deep Packet Inspection Problem, at Least 186 ISPs Breaking Rules

European Digital Rights organization (EDRi) along with 45 NGOs, academics and companies from 15 countries sent an open letter to European policymakers and regulators on Wednesday warned against the widespread use of Deep Packet Inspection (DPI) technology by Internet service providers in the EU. more

Most Read – Last 30 Days

Recent Comments

As a Service?
What Does It Mean to Deploy DMARC?
What Does It Mean to Deploy DMARC?
ICANN at a Crossroads: GDPR and Human Rights
5G Security Transparency
5G Security Transparency
Trump Orders Cyberattacks by US Companies

Topics

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byAfilias

New TLDs

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Industry Updates

Reverse WHOIS: A Powerful Process in Cybersecurity

WhoisXML API The future continues to look bleak as the total amount lost to cybercrime is expected to keep growing. It will, in addition, put incentives for innovation and investment at risk, making cybercrime more profitable than ever. more

End User Radix Premium Domain Sales – May 2019

Radix At Radix, we're always on the lookout for websites on our TLDs that stand out from the rest. In this post, we look at four end-user premium domain name sales, or "Marquees" as we'd like to call them, that were registered in May 2019. more

5 Reasons Why Businesses Must Do Email Verification

WhoisXML API Everything important in business needs to be adequately maintained for effective long-term operations. This includes relationships with customers, employees, and partners as well as IT systems and equipment. more

IP Geolocation: How to Locate and Stop Phishing Threats

WhoisXML API The web has made the world a smaller place by reducing the relevance of location. How so? Anyone, no matter where they are, can now reach out to anyone else with useful information ranging from breaking news events to commercial proposals. more

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

WhoisXML API What keeps CISOs up at night? For hundreds of senior company leaders across countries and industries, the steady growth of cybercrime is one of their biggest concerns. Consequently, organizations spend more money than ever to mitigate the risks and consequences of data breaches, despite a new wave of attacks being on its way as we speak. more

Threat Intelligence: Understanding Adversaries and Threats

WhoisXML API This quote from The Art of War could not be more relevant when we think of today's digital battlefield: "If you know the enemy and know yourself, you need not fear the result of a hundred battles." more

SSL Configuration Analysis: What Is It? Why Does It Matter?

WhoisXML API Anyone interested in starting doing business online should have a few essential things ready before rushing head-on, including a memorable name and a potentially profitable business model. more

The Roots of WHOIS and Its Applications: 3 Fundamental Questions

WhoisXML API Journalists, brand specialists, cybersecurity researchers... Everyone wants answers on who does what online, so where can you get the clues you seek? WHOIS data, alongside its databases and related products, can help you find out who's behind the most notorious websites - and possibly the shadiest ones as well. more

Why Your Company Needs to Use Cybersecure IP Geolocation APIs

WhoisXML API All entrepreneurs typically have a single goal in mind - ensuring their company's success -- and that means reaching and getting as many customers as possible. Nowadays, that translates to taking advantage of the data that GPS-enabled devices provides. more

Verisign Q1 2019 Domain Name Industry Brief: Internet Grows to 351.8 Million Domains in Q1 of 2019

Verisign Verisign today released the latest issue of the Domain Name Industry Brief, which shows that the first quarter of 2019 closed with 351.8 million domain name registrations across all top-level domains (TLDs), an increase of 3.1 million domain name registrations, or 0.9 percent, compared to the fourth quarter of 2018. more

3 Ways to Combat Phishing in 2019

WhoisXML API Just when we thought that phishing has run out of its bag of tricks, hackers are changing their tactics. Whereas before the attacks could be generalized and random, this time, they are more targeted, tailored, and personal. What are crooks up to? more

Domain Research and Monitoring: Keeping an Eye on the Web for You

WhoisXML API Maintaining an online presence isn't as simple as choosing a name, putting it up, and waiting until things turn out well. Once you're out there, you have to keep an eye on your domain and what's happening around because not doing so could put you at a disadvantage or even in danger. more

How the Best IP Geolocation API Can Support Cybersecurity Efforts

WhoisXML API Cybersecurity is pretty much a game of "hide and seek" - cybercriminals hide, cybersecurity teams seek -- and the damage is often based on how long the perpetrators are able to continue their attacks without being found. more

WHOIS History API: Powering Domain Investigations

WhoisXML API The Internet is like a beach - you will most likely leave behind footprints while you are there. And these impressions can be traced back to whoever left them. The same is true with domain ownership. That website name you plan to launch your next venture on? Its domain may have a history of its own. more

Radix's Karn Jajoo Talks GDPR Benefits, Positive Outlook of New gTLDs and Radix's Impressive Growth

Radix In a recent interview with Karn Jajoo, Head of Premium Portfolio at Radix, he discusses Radix's impressive growth in 2018, the positive impact of the EU's GDPR has been it's spawned privacy discussions in developing countries with local data privacy laws and more. more

The Era of Malware: 3 Techniques to Detect and Stay Protected

WhoisXML API A while back, creating malicious software was sort of a hobby for programmers. It was hardly ever used to make money, but more of a way to show off what one can do with a computer. more

Domain Reputation API: Scoring High Points for Deliverability and Security

WhoisXML API As scary as it may seem, everyone is a target on the Web. Worse, your susceptibility to cyber attacks, when not promptly addressed, marks you not just as a target but can even lead others to consider you as a threat. more

Leading Voices  –  From our corporate sponsors

Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 43,400 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 174,862 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 135,725 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 11,596 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 204,915 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 52,894 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 32,170 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 18,427 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 14,671 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 8,042 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 568,123 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 5 posts viewed 36,905 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 132,227 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 59,330 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 23,920 times