Hot Topics:   Security    Cyberattack    Policy & Regulation    Domain Names    Top-Level Domains    DDoS    Access Providers    more...

Featured Blogs

Selling DONA Snake Oil at the ITU

Anthony Rutkowski A venerable old ITU tradition got underway today. Its Telecommunication Standardization body, known as the ITU-T, gathered, as it has done every four years for much of the past 100 years in a conclave of nations, to contemplate what they should be doing at their Geneva intergovernmental standards meetings for the next four years. The gathering is called the WTSA... Old intergovernmental institutional habits still continue, so the participants are gathered in a remote location in Tunisia called Hammamet. more»

Trust Isn't Easy: Drawing an Agenda from Friday's DDoS Attack and the Internet of Things

Olaf Kolkman Last week, millions of infected devices directed Internet traffic to DNS service provider Dyn, resulting in a Distributed Denial of Service (DDoS) attack that took down major websites including Twitter, Amazon, Netflix, and more. In a recent blog post, security expert Bruce Schneier argued that "someone has been probing the defences of the companies that run critical pieces of the Internet". This attack seems to be part of that trend. This disruption begs the question: Can we trust the Internet? more»

Security as a Major Factor for Online Consumers

Nate Vickery There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more»

The Massive Cyberattack or Chronicle of a Strike Foretold

Fernando Barrio During the last Computer Law Conference organized by ADIAR (Argentina Computer Law Association) and the Universidad Nacional de Sur, I gave a conference on the Internet of Things, cybercrime and dangerous situation presented by the lack of proper regulation -- a topic in which I have one of my research projects. At the moment some people argued that I was talking about something that might happen in a relatively distant future, dissenting with my view that the possibility was imminent.. more»

The Internet Needs a Security and Performance Upgrade

Martin Geddes Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more»

How Did We Get Here? A Look Back at the History of IANA

Geoff Huston October 2016 marks a milestone in the story of the Internet. At the start of the month, the United States Government let its residual oversight arrangements with ICANN over the operation of the IANA lapse. No single government now has a unique relationship with the governance of the protocol elements of the Internet, and it is now in the hands of a community of interested parties in a so-called Multi-Stakeholder framework. This is a unique step for the Internet and not without its attendant risks. How did we get here? more»

Understanding 'Reverse Domain Name Hijacking' Under the UDRP

Doug Isenberg "Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more»

Building a Base of Knowledge for Advocacy Abroad in the Digital Age

Daniel A. Sepulveda Answering questions at the Internet Association's Virtuous Circle conference last week, Secretary Kerry presented the U.S. Department of State's effort to prioritize global digital economy issues abroad in order to reflect the growing importance of these issues in both economic and foreign policy. The State Department has made real progress on this initiative in the last year and hopes to continue our momentum going forward. more»

The Importance of Protecting Credibility: Claiming and Rebutting Cybersquatting

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) is an online dispute resolution regime. While panelists technically have discretion under Rule 13 to hold in-person hearings if they "determine[ ] ... and as an exceptional matter, that such a hearing is necessary for deciding the complaint" no in-person hearing has ever been held. Rule 13 exists to be ignored. more»

China Shows Positive Attitude Towards IANA Transition

Jian Chuan Zhang Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more»

Another Free Registry Software Option

Roland LaPlante Google has recently announced the release of Nomulus, its free, open source registry software, triggering discussion of its impact on the industry. Afilias has over 15 years of experience in registry operations, and offers the following initial thoughts... First, free registry software is not new.CoCCA has offered this option for years, and TLDs such as .CX (Christmas Island) and .KI (Kiribati) use it. It is supported on a "best efforts" basis and appears to meet the limited needs of a few small operators. more»

Using Dot Brand Domains in Brand Communication

Guillaume Pahud A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more»

Web Localization: Sometimes as Simple as a Black and White

John Yunker The death of Thailand's King Bhumibol Adulyadej has led to stores running out of black and white clothing as the population mourns its leader in color-appropriate clothing. What does this mean for website localization? ...Web localization isn't just about creating a localized website and forgetting about it. It's about creating a living and breathing website that responds quickly to local events. Web localization is about respect. more»

Africa, Let's Embrace v6 Now!

 Vymala Thuron AFRINIC is the regional Internet registry for Africa, and our core activity is to manage and distribute Internet numbers resources (IPv4, IPv6 and ASN's) to the 57 economies in Africa. IPv4 address scarcity is a very real issue worldwide, the internet keeps growing and the demand for Internet addresses will continue to grow. Africa has the lowest number of Internet users in the world. Internet's penetration in Africa jumped from very low level in 2009, to around 16% of individuals in 2013 and over 20% in 2015. more»

The Future of Software Patents

Russ White What should we do with software patents? I've seen both sides of the debate, as I work a great deal in the context of standards bodies (particularly the IETF), where software patents have impeded progress on a community-driven (and/or community-usable) standard. On the other hand, I have been listed as a co-inventor on at least 40 software patents across more than twenty years of work, and have a number of software patents either filed or in the process of being filed. more»

News Briefs

U.S. Senator Inquiring Into Friday's Crippling Cyberattack

U.S. Sen. Mark R. Warner (D-VA), a member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, has released a letter asking three federal agencies for information on the tools available that prevent cyber criminals from compromising consumer products, such as Internet of Things (IoT) devices. ›››

Amnesty International: Popular Mobile Apps Failing to Adopt Basic Privacy Protections

"Tech companies like Snapchat and Skype's owner Microsoft are failing to adopt basic privacy protections on their instant messaging services, putting users' human rights at risk," says Amnesty International. ›››

U.S. Federal Government Response Too Slow to Friday's Internet Attack, Warns Cybersecurity Official

"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. ›››

U.S. Department of Transportation Issues Federal Cybersecurity Guidance to Automotive Industry

U.S. Department of Transportation issues Federal guidance to the automotive industry for improving motor vehicle cybersecurity. The guidance covers cybersecurity best practices for all motor vehicles, individuals and organizations manufacturing and designing vehicle systems and software. ›››

Substantial DDoS Attack Disrupts Twitter, Netflix, Visa and other Major Sites

Major internet sites were disrupted for several hours this morning as internet infrastructure provider Dyn reported it was under a cyberattack, mainly affecting traffic on the U.S. East Coast. ›››

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. ›››

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules

The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. ›››

US Banks Face New Demands by Regulators for Higher Cyber Risk Management Standards

U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms," Patrick Rucker reporting in Reuters. ›››

FBI, Czech Police Arrest Russian in Connection With US Hacking Attacks

FBI in a joint operation with the Czech police, arrested a Russian citizen in Prague on Wednesday in connection with attempted cyber-attacks against the United States. ›››

Syria's Undersea Cable Repairs Will Take Down 60% of Nation's Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. ›››

Google Announces Nomulus, Open Source Top-Level Domain Name Registry

Google today announced the release of Nomulus, a new open source cloud-based registry platform that runs Google's top level domains (TLDs) and now available to everyone. ›››

DNC Emails Hacked Using Fake Gmail Login Forms

A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. ›››

WikiLeaks: Ecuador Has Cut Off Assange's Internet Access

WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. ›››

Montenegro Election Day Disrupted by Several Cyberattacks

The Ministry for Information Society and Telecommunications of Montenegro has confirmed several key websites were targeted by cyberattacks on Sunday (16 October), the day of the country's parliamentary elections. ›››

UK Security Agencies Have Unlawfully Collected Data for 17 Years, Says Court

"British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, top judges have ruled," according to a report published today in The Guardian. ›››

Lawsuit Against IANA Transition Dropped

Four US states attorneys general have quietly thrown in the towel in their attempt to have the IANA transition blocked," reports Kevin Murphy this morning in Domain Incite. ›››

Putin Shrugs Off US Retaliation Threat Over Alleged DNC Hack

"Vladimir Putin on Sunday shrugged off new US threats to retaliate against alleged Russian hackers, saying such statements only confirmed that Washington used cyber-attacks for political ends," Reuters reports. ›››

Notorious Russian Ship Yanter Suspected of Cutting Syria's Undersea Internet Cables

A Russian ship, suspected by intelligence and military officials to be capable of cutting undersea Internet cables, is spotted near the coast of Syria. ›››

British Banks Not Fully Reporting Cyber Attacks, Fear Punishment, Bad Publicity

"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. ›››

Google and Facebook Join Forces to Directly Connect Los Angeles to Hong Kong via Undersea Cable

TE SubCom, leading provider of undersea communications technology and marine services, along with Facebook, Google, and PLDC (Pacific Light Data Communication Co. Ltd.), have announced that they will co-build the Pacific Light Cable Network (PLCN), a 12,800 km transpacific submarine cable system that will provide the first direct undersea route between Hong Kong and Los Angeles, California (USA) with ultra-high capacity transmission. ›››

Popular News – Last 30 Days

Recent Comments

Another Free Registry Software Option
Another Free Registry Software Option
Another Free Registry Software Option

Sponsored Topics



Sponsored by


Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services

DNS Security

Sponsored by

Industry Updates

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

MarkMonitor In the capacity that MarkMonitor has as an ICANN accredited registrar, we have observed numerous issues with registrations in the .feedback registry. These issues date back to the initial launch of .feedback earlier this year. more»

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

8 Tips to Find Your Perfect .COM Domain Name

Verisign With nearly 30 years of top-tier news, entertainment and businesses associated with .com, it has become one of the most versatile, trusted and recognizable domain name extensions around the world. more»

Why .com is the Venture Capital Community's Power Player

Verisign The Venture Capital (VC) community is well aware of the value of a great domain name. Recent data shows that .com is the most popular domain extension for funded startups. more»

Defending Against Layer 7 DDoS Attacks

Verisign Layer 7 attacks are some of the most difficult attacks to mitigate because they mimic normal user behavior and are harder to identify. Verisign's recent trends show that DDoS attacks are becoming more sophisticated and complex, including an increase in application layer attacks. more»

Understanding the Risks of the Dark Web

MarkMonitor At least 60% of brands will discover a breach of sensitive data. However, many organizations simply don't know what they don't know. Researchers at MIT discovered that a full 75 percent of breaches go undiscovered for weeks or months and 67 percent of breaches were aided by significant errors from employees of the victimized firm. more»

The .cancerresearch TLD: Search for Cure Drives Digital Innovation

Neustar Coinciding with the launch of the International Centre for the Proteome of Human Cancer (ProCan™), the Australian Cancer Research Foundation (ACRF) has added to its growing network of sites on the .cancerresearch TLD. more»

New TLD? Make Sure It's Secure

Neustar The introduction of hundreds of new Top-Level Domains (TLDs) is an exciting time for consumers, businesses, and the Internet community as a whole. However, malicious actors seeking new channels to pursue their activities are also rubbing their hands together with the launch of these TLDs. more»

Radix Launches Startup League at TechCrunch

Radix The Startup League is a unique startup-support program designed to aid early stage startups that use any of Radix's TLDs to launch their idea or company. This initiative will support startups across several key areas like marketing, event sponsorships, and PR. more»

Celebrating One Year of .online

Radix Last year this time, one of the most awaited new gTLDs, .ONLINE entered general availability followed by a successful launch. With 10,000 registrations in the first 10 minutes and 38,000 in the first 24 hours, it was one of the most sought after extensions by customers globally. more»

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Verisign today released its Q2 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services, and research conducted by Verisign iDefense Security Intelligence Services. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Josh Ray
Vice President of Cybersecurity Intelligence at VerisignJoined on May 09, 2014

Richard J Tindal
Joined on Feb 07, 2009

Katim S. Touray
International Development Consultant, and ICT for development advocateJoined on Sep 16, 2012

Alessandro Vesely
Tiny ISP and freelance programmerJoined on Aug 01, 2005

Greg Aaron
President, Illumintel Inc. and Co-Chair of the APWG's Internet Policy CommitteeJoined on Oct 30, 2008

Wolfgang Kleinwächter
Professor Emeritus at the University of AarhusJoined on Sep 09, 2011

Chris Linfoot
IT Director @ LDV Group LimitedJoined on Jul 20, 2004

Kiran Malancharuvil
Internet Policy Counselor at MarkMonitorJoined on Sep 25, 2013

Xudong Zhang
Vice PresidentJoined on Aug 06, 2015

Joined on May 04, 2012

Robin Gross
Founder and Executive Director of IP JusticeJoined on Jan 08, 2011

Bruce Sinclair
CEO, gogo6Joined on May 23, 2012

Antony Van Couvering
Joined on Jul 16, 2005

Robert Cannon
CybertelecomJoined on Aug 08, 2007

Lee S Dryburgh
Founder of eComm Media, IncJoined on Feb 12, 2008

Ross Rader
Director of Innovation & ResearchJoined on Jun 14, 2003

Kathy Brown
President and CEO, Internet SocietyJoined on Oct 20, 2015

Martin Geddes
Founder, Martin Geddes Consulting LtdJoined on Jan 15, 2004

Christopher Parente
Founder, Content Marketing AgencyJoined on Jul 27, 2005

Leonard Grace
Founder & Editor - Broadband ConvergentJoined on May 01, 2010

Michael Roberts
Joined on Feb 18, 2006

Kim Davies
Manager, Root Zone ServicesJoined on Feb 23, 2005

Tom Daly
Chief Scientist and Co-Founder at Dyn IncJoined on Oct 15, 2008

John Kane
Vice President of Corporate Services, AfiliasJoined on Jun 07, 2010

Jon Farmer
Voice Technical Lead, Entanet International LtdJoined on Mar 20, 2009

Alec Saunders
Vice President, Developer Relations, BlackBerry Joined on Apr 24, 2007

Andrew Thong
Web Developer at Incognito Software SystemsJoined on Jul 22, 2013

Susan Crawford
Professor, Cardozo Law School in New York CityJoined on Nov 19, 2003

Christian Dawson
Executive Director, i2CoalitionJoined on Oct 31, 2013

Michele Neylon
MD of Blacknight SolutionsJoined on Mar 02, 2004