Hot Topics:   Security    Policy & Regulation    Internet Governance    Privacy    Broadband    Domain Names    Top-Level Domains    more...

Featured Blogs

The Emotional Cost of Cybercrime

Ross Anderson We know more and more about the financial cost of cybercrime, but there has been very little work on its emotional cost. David Modic and I decided to investigate. We wanted to empirically test whether there are emotional repercussions to becoming a victim of fraud (Yes, there are). We wanted to compare emotional and financial impact across different categories of fraud and establish a ranking list (And we did). more»

Why I Wrote 'Thinking Security'

Steven Bellovin I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more»

Regulation and Reason

Bill Smith Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more»

In Network Security Design, It's About the Users

Burt Kaliski One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more»

Only One Week Left to Submit Nominations for PIR Board of Directors (Closes Nov 30)

Dan York If you would like to help guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains, the deadline for nominations is MONDAY, NOVEMBER 30, 2015! After reading the information about the PIR Board requirements, you are welcome to nominate either yourself or anyone else using the PIR Nomination Form. Nominations close at 23:00 UTC on November 30, 2015, so don't delay! more»

Zero Rating, a Poisoned Chalice for the Developing World

Mwendwa Kivuva A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more»

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

Scott Hollenbeck In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more»

RIPE 71 Meeting Report

Geoff Huston The RIPE 71 meeting took place in Bucharest, Romania in November. Here are my impressions from a number of the sessions I attended that I thought were of interest. It was a relatively packed meeting held over 5 days. So this is by no means all that was presented through the week... As is usual for RIPE meetings, it was a well organised, informative and fun meeting to attend in every respect! If you are near Copenhagen in late May next year I'd certainly say that it would be a week well spent. more»

USA Fibre Investments Encouraging Further Operator Expansion

Paul Budde According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more»


Nick Ashton-Hart Internet public policy -- and the technical ecosystem -- is at a crossroads and the choice of CEO that ICANN's board makes now is probably the most important such choice it has ever made. Since I work in Internet policy across the Geneva institutions where more than 50% of all international Internet-related policy meetings take place, and have worked at ICANN in senior positions in the past, I thought I would suggest some qualities the next CEO should have. more»

How DANE Strengthens Security for TLS, S/SMIME and Other Applications

Shumon Huque The Domain Name System (DNS) offers ways to significantly strengthen the security of Internet applications via a new protocol called the DNS-based Authentication of Named Entities (DANE). One problem it helps to solve is how to easily find keys for end users and systems in a secure and scalable manner. It can also help to address well-known vulnerabilities in the public Certification Authority (CA) model. Applications today need to trust a large number of global CAs. more»

Battling Cyber Threats Using Lessons Learned 165 Years Ago

Gunter Ollmann When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more»

Another Day, Another Two Million Dollars

John Levine ICANN just published the results of the auction for .HOTELS and .HOTEIS. The high bidder (I'm not sure "winner" really applies here) was, who will use .HOTELS. The $2.2M they paid, along with the prior results, notably the $25 million Google paid for .APP, brings the total in ICANN's auction pot to about $60.5 million. There's a few more auctions scheduled for CAM, PHONE, and SHOP/SHOPPING, along with yet to be scheduled auctions for DOCTOR, INC, LLP, and LLC. more»

Did We Build the 'Right' Internet? (An Interview with Prof Andrew Russell)

Martin Geddes The longer I have been in the tech industry, the more I have come to appreciate the hidden complexity and subtlety of its past. A book that caught my attention is 'Open Standards and the Digital Age' by Prof Andrew Russell of Stevens Institute of Technology in New Jersey. This important work shines a fresh light on the process that resulted in today's Internet. For me, it places the standard 'triumphant' narrative of the rise of TCP/IP into a more nuanced context. more»

Exploiting Video Console Chat for Cybecrime or Terrorism

Gunter Ollmann A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more»

News Briefs

ISOC Joins 200 Others Urging UN to Safeguard Key Internet Principles

– The Internet Society today announced that it has joined more than 200 organizations and individuals who have signed a statement intended for leaders and governments participating in the United Nations General Assembly's 10 Year Review of the World Summit on the Information Society (WSIS+10 Review). ›››

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

As part of its transparency report, Google says Copyright removal requests continue to be on steady rise and that the company received a new record 65,923,523 requests just last month. ›››

Under Pressure, ICANN Reveals Lobbying Expenses

Following several months of pressure, ICANN has revealed a breakdown of figures under its catch-all term of "professional services," exposing its political expenses, Kieren McCarthy reported today in the Register. ›››

China Seeking to Construct Its Own Uncrackable Smartphones

Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. ›››

UK Announces Additional £1.9 Billion in Cyber Security Funding

Chancellor George Osborne announces government plan to almost double its investment in cyber security initiatives over the next five years, spending an additional £1.9 billion. ›››

Vehicle Manufacturers Tell Govt to Stay Off Regulating "Internet of Cars"

Major car manufacturers in U.S. are asking Congress to stay away from any type of increased regulation unless "absolutely necessary" as the industry evolves to take advantage of the "Internet of cars." ›››

Sony Uses Brand TLD '.sony' for Bond Game Site

Sony is using it's newly secured brand Top-Level Domain, '.sony' for a game site as part of the promotion for its latest Bond movie. ›››

Bangladesh Govt Orders Internet Shutdown on 'Security Grounds'

Access to the internet was denied for about two hours in Bangladesh immediately after the Supreme Court upheld the death penalty for Salauddin Quader Chowdhury and Ali Ahsan Muhammad Mujahid. ›››

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. ›››

Internet Society Reinforces Need to Connect the Unconnected, Build Trust

The Internet Society's President and CEO, Kathy Brown, has highlighted how connecting the unconnected and building trust are the two most pressing imperatives facing the Internet today. ›››

Internet a Key Catalyst for Sustainable Development, Says ISOC CEO

Internet Society President and CEO Kathy Brown wrote about the critical role that the Internet has in enabling the implementation of the UN Sustainable Development Goals (SDGs). ›››

Harm Caused by Typosquatting Is Still Modest, Research Suggests

Harm caused by domain name typosquatting is still modest, to both the user and the brand holder, and investment on anti-typosquatting products should be cautious, according to a paper published in Security and Privacy (SP), 2015 IEEE Symposium titled, "Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting." The paper presents a strategy for quantifying the harm caused by the cybercrime of typo squatting via an intent inference technique. ›››

GigaNet Symposium Will Be Held Next Week in Brazil

On Monday, 09 November 2015, the Global Internet Governance Academic Network (GigaNet) will hold its 10th Annual Symposium on Internet Governance Research in João Pessoa, Brazil. The symposium will take place as a pre-event of the United Nations Internet Governance Forum (IGF) which starts on Tuesday in the same location. During their symposium researchers from several parts of the world will address various topics including privacy, infra-structure, trust, security and more. ›››

Internet Activity in Britain Stored for a Year Under New Surveillance Law

The internet activity of everyone in UK will have to be stored for one year by Internet service providers, under the new surveillance law plans. "This duty would include forcing firms to hold a schedule of which websites someone visits and the apps they connect to through computers, smartphones, tablets and other devices. Police and other agencies would be then able to access these records in pursuit of criminals -- but also seek to retrieve data in a wider range of inquiries, such as missing people." ›››

Nauruan Gov't Says Ban on Facebook and Such Protects Citizens from "Abuse, Harassment and Bullying"

The Nauruan government says ban on websites such as Facebook is to protect its citizens from "abuse, harassment and bullying" as the United Nations urges the island's controversial regime to lift its ban on freedom of expression and human rights. ›››

Public Cloud Services in Mature Asia/Pacific Region to Reach $7.4 Billion in 2015

The public cloud services market in the mature Asia/Pacific (AP) region is on pace to grow 8.7 percent in 2015 to total $7.3 billion, up from $6.7 billion in 2014, according to new research from Gartner. ›››

New Bill Bans Internet Companies From Offering Unbreakable Encryption

Companies such as Apple, Google and others will be banned from offering encryption so advanced that even they cannot decipher it when asked to under the UK's Investigatory Powers Bill. ›››

EU Parliament Says Citizens Rights Still in Danger, Calls for Immediate Measures

Members of the European Parliament have taken stock of the lack of action taken to safeguard citizens' fundamental rights following revelations of electronic mass surveillance. ›››

Cuba's Internet Connection to the World Worse Than Expected

Inspired by expansion announcements from companies such as Netflix and Airbnb into Cuba, Fabián E. Bustamante, professor of electrical engineering and computer science in the McCormick School of Engineering, and his graduate student Zachary Bischof, conducted research examining feasibility of the business ideas given the region's notoriously weak network infrastructure. ›››

Neighbours Create Their Own Internet Service on Orcas Island

Faced with slow and outage-prone Internet access, residents of Orcas Island, one of the San Juan Islands in Washington state, decided to design their own network and built it themselves. ›››

Popular News – Last 30 Days

Recent Comments

Taking Back the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS

Featured Cartoon

Meanwhile in Yet Another IG Panel

Sponsored Topics

Industry Updates

Radix's .ONLINE Fastest to Sell 100,000 Domains

Radix After a very successful launch (38,000 domains in the first 24 hours) and breaking all nTLDrecords, .online surpassed 100,000 domain registrations this morning. Radix shared the 100,000th domain to be registered -- that came through eNom. more»

To Where are Bounce Messages Sent?

Port25 This seems to be one of the greatest mysteries to new postmasters. It can be confusing as the messages go to the SMTP MAIL FROM address, which can be different from, or the same as the from header. The key to understanding bounces (sometimes referred to as DSNs, Delivery Status Notifications or NDRs, Non-Delivery Reports) is that they should always be sent to the SMTP MAIL FROM address. Some mail platforms may not adhere to this rule, but most do. more»

.PRO Domains Now Available to All

Afilias Global registry leader Afilias announced that beginning today, .PRO is an unrestricted Top Level Domain open to all registrants. That means that everyone is now eligible to register a domain name ending with .PRO, such ''. more»

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Afilias IDG's Computerworld announces Ram Mohan, Afilias' executive vice president and chief technology officer, as a 2016 Premier 100 Technology Leaders honoree. This year's Premier 100 spotlights 100 leaders of companies for their exceptional technology leadership and innovative approaches to business challenges. more»

An Open Source Perspective on Commercial MTAs

Port25 It's always refreshing to obtain a different perspective, especially from the open-source community regarding email sending infrastructure. For those who are currently utilizing an open-source product, we thought this feedback from one of our constituents would be valuable for decision makers. more»

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter. more»

Five Essential PowerMTA Configuration Tips

Port25 When asked what are the best configurations to use with PowerMTA? The answer is different for every region of the world. Configuration settings in the US will be vastly different than those in Europe for example, so global settings are not as effective. more»

Protect Your Privacy - Opt Out of Public DNS Data Collection

Verisign We've all seen the check boxes. They're hidden at the bottom of webpages. You can't ignore them, but sometimes you forget they are there. They offer to send you deals and coupons. Some even offer to connect you with their partners for similar benefits. Do you check the box? more»

What's New With Port25's PowerMTA v4.5

Port25 Port24 recently intruded PowerMTA v4.5 as a major new release of PowerMTA. It now includes a wide variety of new advanced features and functionalities that allow for greater flexibility and delivery control to help maximize overall performance and deliverability. more»

The ".law" Domain Gains Momentum Throughout the Legal Profession

Minds + Machines Minds + Machines has announced that the .law domain names may be applied for by qualified lawyers on a first-come, first-served basis at standard rates. The seven-day Early Access Program, during which .law domain names were priced higher to accommodate initial demand, ended at 1600 UTC on October 19. more»

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Verisign Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Stéphane Van Gelder
Chairman, MILATHANJoined on Aug 27, 2008

Ron Aitchison
Consultant, developer and authorJoined on Oct 04, 2005

Sivasubramanian M
CEO, Turiya and President, Internet Society India ChennaiJoined on Nov 07, 2008

John Berard
Founder, Credible Context & CEO, Vox Populi RegistryJoined on Nov 29, 2005

Matt Blumberg
CEO and Chairman at Return PathJoined on Feb 02, 2006

Daniel Golding
VP and Research Director at Tier 1 ResearchJoined on Oct 19, 2004

Andrew Mack
Principal at AMGlobal ConsultingJoined on Oct 08, 2009

John Matson
Co-Founder and COO of ArchitelosJoined on Jul 11, 2011

Ewan Sutherland
Telecommunications Policy AnalystJoined on Jan 01, 2006

Frederick Felman
Chief Marketing Officer at MarkMonitorJoined on Nov 18, 2008

Bill Thompson
Journalist, Commentator and Technology CriticJoined on Sep 09, 2004

Phillip Hallam-Baker
Consultant, Author, SpeakerJoined on May 22, 2010

Justin Howe
Professional Services Engineer at NeustarJoined on Jul 11, 2013

Michael D. Palage
Intellectual Property Attorney and IT ConsultantJoined on Aug 30, 2006

Konstantinos Komaitis
Policy Advisor for the Internet SocietyJoined on Apr 01, 2004

William L. Yan
Chief Operating Officer at Incognito Software SystemsJoined on Jan 17, 2013

Scott Hollenbeck
Senior Director of The Hive at VerisignJoined on Jan 24, 2014

Jeremy Malcolm
Co-coordinator, Civil Society Internet Governance CaucusJoined on Sep 20, 2006

Don Moody
Domain Name & IP attorney in Los Angeles, co-founder of New gTLD DisputesJoined on Nov 14, 2007

Venkat Balasubramani
Tech-Internet Lawyer at Focal PLLCJoined on Sep 10, 2007

Richard Bennett
Senior Research FellowJoined on Oct 23, 2007

Chris Linfoot
IT Director @ LDV Group LimitedJoined on Jul 20, 2004

Kim Davies
Manager, Root Zone ServicesJoined on Feb 23, 2005

Norbert Grey
CFO of ArchitelosJoined on Jun 29, 2011

Bob Parsons
President & FounderJoined on Mar 03, 2004

Dave Crocker
ConsultantJoined on Oct 27, 2004

Avri Doria
Independent Research ConsultantJoined on May 15, 2007

Dirk Krischenowski
Founder and CEO of dotBERLIN GmbH & Co. KGJoined on Dec 26, 2005

Kathy Nielsen
Head of Business Development, New gTLDs, SedoJoined on Oct 05, 2011

Chris Wright
Chief Technology Officer at ARI Registry ServicesJoined on Jul 11, 2010