Hot Topics:   Cybersecurity    Policy & Regulation    Internet Governance    Domain Names    Cybercrime    Whois    Cyberattack   

Featured Blogs

The Unbelievably High Cost of the War Against Huawei

Dave Burstein U.S. companies were selling $11 billion a year of parts to Huawei before the blockade. Losing those sales is just the start of the damage. Every other Chinese and Russian company is making sure to find non-US suppliers. The U.S. has threatened India and Turkey with sanctions as well. As other companies replace U.S. components, the impact will be tens of billions more than the $11 billion of Huawei suppliers. more

Shame on the Regulators

Doug Dawson It's clear that even before the turn of this century that the big telcos largely walked away from maintaining and improving residential service. The evidence for this is the huge numbers of neighborhoods that are stuck with older copper technologies that haven't been upgraded. The telcos made huge profits over the decades in these neighborhoods and ideally should not have been allowed to walk away from their customers. more

Let's Have an Honest Conversation About Huawei

Milton Mueller On May 29, I attended an AEI event on "International economics and securing next-generation 5G wireless networks," with Ambassador Robert Strayer, who heads the U.S. State Department's CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications vendor Huawei – another episode in an ongoing U.S. government campaign to shut Huawei and other Chinese firms out of the U.S. market, and to convince every other country in the world to do the same. more

Domain Enforcement in a Post-GDPR World

Frederick Felman The implementation of the General Data Protection Regulation (GDPR), and ICANN's conservative temporary policy, which favors privacy and limits registrar liability, has made domain enforcement against cybersquatters, cyber criminals and infringement more difficult, expensive and slow. With heightened concerns over privacy following high-profile breaches of consumer data and its subsequent illicit use and distribution, there is no question that consumer data protection practices would come under scrutiny. more

The Myth of 5G and Driverless Cars

Doug Dawson A colleague sent me an article that had been published earlier this year in MachineDesign magazine that predicts that driverless cars can't be realized until we have a ubiquitous 5G network. When looking for the original article on the web I noticed numerous similar articles like this one in Forbes that have the same opinion. These articles and other similar articles predict that high-bandwidth, low-latency 5G networks are only a few years away. more

Interstate at Rush Hour …in the Rain …on a Friday – AKA, Your Enterprise Traffic on the Net

Sean Kaine Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more

Celebrating Twenty Years of the UDRP

Caroline Valle The Uniform Domain Name Dispute Resolution Policy, commonly known as the UDRP, was first introduced on October 24, 1999, by the Internet Corporation for Assigned Names and Numbers (ICANN). The UDRP is incorporated by reference into Registration Agreements for all generic top-level domain names (gTLDs) and some country-code top-level domain names (ccTLDs). more

The Loss of a Friend

Veni Markovski Dear colleagues and friends, it is very, very difficult to write these words. The loss of a young person is always a tragedy. The untimely loss of a friend is even worse and is always a very difficult time. The loss of a fellow Internet pioneer is like losing a brother. Tarek Kamel was a great friend of the Internet Society–Bulgaria. I remember him giving an interview for the Bulgarian public television in Yokohama during the INET 2000 meeting... more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

Juha Holkkola In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

The "Kiwi" Way of Interneting

Konstantinos Komaitis By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more

Encryption and Child Sexual Abuse Prevention

Jeremy Malcolm Just over one week ago, the New York Times published a major investigation into the intractable problem of illegal sexual images of minors being exchanged online. Despite flaws in the story and its companion pieces, the main take-away that Internet companies have failed to adequately address the problem has resonated widely. Prostasia Foundation too has been critical of some of the Internet platforms called out in the article. But at the same time, we need to be realistic about how much responsibility we can (or should) place on tech firms to solve this problem. more

The Crypto Wars Resume

Steven Bellovin For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

US Court Upholds Repeal of Net Neutrality

Doug Dawson The DC Circuit Court of Appeals ruled on the last day of September that the FCC had the authority to kill Title II regulation and to repeal net neutrality. However, the ruling wasn't entirely in the FCC's favor. The agency was ordered to look again at how the repeal of Title II regulation affects public safety. In a more important ruling, the courts said that the FCC didn't have the authority to stop states and municipalities from establishing their own rules for net neutrality. more

Kenya’s .KE Domain Registrations Nearing 100,000 Mark, but It Can Do Better – Here’s Why

Mwendwa Kivuva Over the years, the Kenyan Network Information Center (KeNIC) has struggled to reach the 100,000 mark in .ke Kenya country code domain registrations. Many reasons have been given for this shortfall, among them pricing, competition from generic Top-Level Domains (gTLDs) like .com and .org, and also competition from Geographic domains like the new .africa. Also, not opening up the second level for registration has been cited as one of the reasons for the low number. more

Unpublished Autobiographical Essay of Steve Lukasik on His Accomplishments at ARPA

Stephen J. Lukasik Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more

News Briefs

Leading Domain Registries and Registrars Release Joint Document on Addressing 'DNS Abuse'

A group of leading domain name registries and registrars have joined forces in the fight against abuse in the Domain Name System (DNS), by developing a "Framework to Address Abuse." Each contributing company has shared its expertise and experience mitigating abusive practices with the goal of submitting the resulting Framework as a foundational document for further discussion in the multistakeholder community.  more

Germany's New Rules for Developing 5G Mobile Networks Will Not Exclude China's Huawei Technologies

German regulators have released a set of guidelines addressing network security for companies wanting to help build next-generation 5G infrastructure. more

China's App Allows "Superuser" Access to Entire Data of Over 100 Million Android-Based Phones

The Chinese Communist Party's app called Study the Great Nation released in January is reported to have "superuser" access to the entire data of over 100 million Android-based phones via a backdoor. more

China to Require Face Scan for Internet Access and New Phone Numbers Starting December

Chinese citizens will be required to let telecommunications carriers to scan their faces in order to sign up for internet access or to get a new phone number. more

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

European Union Member States published a report on the 'EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks'. The report is based on the results of the national cybersecurity risk assessments by all EU Member States. It identifies the main threats and threats actors, the most sensitive assets, the main vulnerabilities, and several strategic risks. more

More Than 500 Schools in the U.S. Hit by Ransomware in 2019, Says Report

A recent report published by the cybersecurity firm Armor says ransomware infections have hit over 500 US schools in 2019 to date. Armor warns the rate of attack seems to be picking up with 15 new ransomware victims in the last two weeks, all of them educational institutions. more

US Court Upholds FCC's Net Neutrality Repeal But Says States Can't Be Barred from Passing Own Rules

A U.S. court decision today determined net neutrality laws could return at the state level overruling Trump administration's effort to block states from passing their own net neutrality laws. more

The U.S. House Judiciary Committee Is Investigating Google's Plans to Implement DNS Over HTTPS

The U.S. House Judiciary Committee is investigating Google's plans to implement DNS over HTTPS (DoH) in Chrome according to a report by the Wall Street Journal over the weekend. more

27 Countries Issue Joint Statement on 'Advancing Responsible State Behavior in Cyberspace'

The joint statement was released on Monday at the United Nations ahead of the UN General Assembly's General Debate calling on all states to support the evolving framework and to join in ensuring "greater accountability and stability in cyberspace." more

Cyber Risk Now on Top of Corporate Risk Agendas, Cyber Insurance Expanding

Results from the 2019 Marsh-Microsoft Global Cyber Risk Perception survey indicates several encouraging signs of improvement in the way organizations view and manage cyber risk. more

Legacy TLD .ORG Takes On New Branding Focus as Part of a New Transformative Journey, Says PIR

Public Interest Registry (PIR), the non-profit organization in charge of operating the 34-year-old legacy top-level domain .ORG on Tuesday revealed a new global brand, including a new visual identity and a new website named TheNew.org. more

Wi-Fi Alliance Launches Wi-Fi 6 Certification Program

Wi-Fi Alliance, the non-profit entity that oversees implementation of the Wi-Fi standard, officially launches the Wi-Fi 6 certification program. more

281 Arrested Worldwide by US Federal Authorities in Connection With Business Email Compromise Scheme

U.S. Department of Justice says federal authorities successfully carried out a "significant" coordinated effort to disrupt Business Email Compromise (BEC) schemes designed to intercept and hijack wire transfers from businesses and individuals. more

The Insecurity of the IoT is Only Getting More Profound, Says Principal Researcher at F-Secure

"Three years after Mirai first appeared, and two years after WannaCry, it shows that we still haven't solved the problems leveraged in those outbreaks," said F-Secure Principal Researcher Jarno Niemela. more

51 CEOs Call on US Congress for Urgent Nationwide Data Privacy Law Overriding State-Level Laws

A letter, signed by 51 CEOs, was sent to U.S. House and Senate and leaders of other committees today urging policymakers to pass a comprehensive national data privacy law. more

Ransomware Causes 15 Schools in Arizona To Stay Closed For a Second Day

The Flagstaff Unified School District (FUSD), in Arizona which consists of 15 schools and over 9,600 students, canceled classes on both Thursday and Friday after a ransomware virus was found on multiple servers. more

Phishing Attacks Targeting Executives Now Top Cybersecurity Insurance Claims, Says AIG

A new report published by the insurance giant, AIG, claims phishing attacks via email, often targeted at senior executives, has overtaken ransomware. more

Hong Kong ISPs Oppose Government Plans for Internet Restrictions Without Industry Consultation

A statement released by the Hong Kong Internet Service Providers Association (HKISPA) denouncing any plans that would restrict Hong Kong's open internet network. more

By 2021 Cost of Cybercrime to Top Annual Natural Disasters and Global Drug Trade Costs, Says Report

By 2021, it is estimated that cybercrime will cost the global economy more than $6 trillion in damages, exceeding annual costs for natural disasters and the global drug trade. more

Australia to Block Domain Names That Host Extremist Content During Attacks

Following the Christchurch massacre in March which resulted in the killing of 51 worshippers at two New Zealand mosques, Australian Prime Minister Scott Morrison while attending the G7 summit in France, said the government will establish a new framework to block domains linked to violent attacks. more

Most Read – Last 30 Days

Recent Comments

Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Celebrating Twenty Years of the UDRP
The Myth of 5G and Driverless Cars
RIP Don Blumenthal
RIP Don Blumenthal
The End of the Road: ICANN, Whois, and Regulation

Topics

Cybercrime

Sponsored byThreat Intelligence Platform

DNS Security

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

Whois

Sponsored byWhoisXML API

New TLDs

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

Domain Names

Sponsored byVerisign

Industry Updates

4 Challenges in Digital Rights Management to Reflect On

Ipify Digital rights management (DRM) is undoubtedly a hot topic in today's connected environment. As over-the-top (OTT) media distribution channels fortify month after month, so do the risks that come with their use. Data theft, billion-dollar revenue losses, and compliance issues are just a few of these risks. As the year draws to a close, let's examine the persistent challenges in the DRM space and how IP geolocation can help in some cases. more

Neustar and usTLD Stakeholder Council to Hold .US Town Hall Live Webcast

Neustar Join Neustar's town hall meeting and help shape the future of .US. Neustar, a leading provider of registry services, is hosting a live town hall forum to discuss the United States' country code Top-Level Domain, .US. It's a can't-miss event for anyone interested in the future of .US. more

The More Threat Intelligence Integrated Into Security Solutions, the Better?

Threat Intelligence Platform (TIP) Today's sophisticated threats present enormous risks for any business. The more connected a company is, the more prone it is to cyber attacks. Enterprises need to devise ways to protect the integrity of their data and ensure that their systems are safe from cyberthreats. more

Online Streaming: Boon or Bane to the Media Industry and Digital Rights Management?

WhoisXML API Copyright infringement laws have become less effective due to the ease of sharing content over the Web. Music streaming services, for example, have increased music consumption and the overall industry revenue, but it also has lessened album sales and song downloads. more

Do IP Geolocation Data Improve User Access Management (UAM)?

Ipify Some organizations have specific policies that limit employee access to information. However, not all have sophisticated security solutions in place to protect against unauthorized access, especially amid cyber attacks that occur left and right. more

Why Companies Should Strive to Stay on Google's Good Side

WhoisXML API Imagine that your registrar informs you the domain you've been eyeing would soon become available for purchase. That's good news. However, your security adviser told you to make sure a domain is threat-free before you buy it. more

Can Domain Blacklisting Be Avoided?

WhoisXML API If we're to sum up what any domain owner would want to avoid, it would be ending up in anyone's blacklist. Domain blacklisting has detrimental consequences for any business. Actually, it can have the same or similar negative brand effects as you'd see in the aftermath of a data breach or PR incident. more

How to Stay Safe Against DNS-Based Attacks

WhoisXML API The Domain Name System (DNS) plays an essential role in resolving IP addresses and hostnames. For organizations, it ensures that users reach the proper sites, servers, and applications. While it's a fundamental base for a functioning Web, the problem is that this system can easily be abused. more

Radix Adds .UNO to Its Domain Portfolio

Radix Radix, leading new domains registry with over 5M domains under management, has acquired .UNO, a top-level domain that was previously operated by Dot Latin LLC. The ownership transfer was completed in September 2019 and Radix now has exclusive rights to operate .UNO globally. more

More than Ever: Why Organizations Need Proactive Defense in 2019

Threat Intelligence Platform (TIP) In the first half of 2019 alone, several data breaches have already exposed as many as 4.1 billion personal records. We've seen even industry giants and low-key players alike succumb to all kinds of data compromise. more

NS1 Raises $33M for Its Application Traffic Management Solutions

NS1 The round was led by Dell Technologies Capital, with participation from Cisco Investments and existing investors Deutsche Telekom Capital Partners, Entrée Capital, Flybridge Capital Partners, GGV Capital, Mango Capital, Salesforce Ventures, Sigma Prime Ventures, Telstra Ventures, and Two Sigma Ventures. more

Unraveling Unsolved Mysteries with Threat Intelligence

Threat Intelligence Platform (TIP) Have you ever heard of Lake City Quiet Pills? It refers to a mysterious site that first made waves on Reddit in 2009 and has since resurfaced. What Is Lake City Quiet Pills? more

Procuring Digital Evidence for Reverse Domain Hijacking Case with Domain Research & Monitoring Tools

WhoisXML API Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more

The Importance of Predictive Analytics and Machine Learning in Cybersecurity

WhoisXML API Experts in the realm of cybersecurity are continually trying to keep up with the changes in the threat landscape. Even with advanced tools on hand, any IT security professional knows that a data breach can happen at any time. more

IP Geolocation: Improving Data Loss Prevention in Virtual Environments through Geofencing

WhoisXML API Each day, threat actors search for targets whose assets they can compromise for personal gain. Their attacks often use exploit kits that can find gaps in networks that they use to infiltrate and compromise vulnerable systems and applications. more

How Radix Is Helping Websites Stand Out With Meaningful, Descriptive Domains

Radix Boasting more than 5 million domains under its management, Radix gives website owners and brands several vibrant, refreshing ways to craft an online presence. more

Thoughts and Recommendations on Addressing Vulnerability Exploitation

WhoisXML API Cybercriminals aren't always as creative as we think they are. There is a myth about them having a never-ending supply of techniques and tricks up their sleeves. However, many can't be considered as innovators in their shady field. more

Leading Voices  –  From our corporate sponsors

Janine Goodman Vice President and Co-founder at Avenue4 LLC 6 posts viewed 45,648 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 34,901 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 138,293 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 141,228 times
Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 45,289 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 12,532 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 24,919 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 183,640 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 54,784 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 8,514 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 213,512 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 19,286 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 588,185 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 15,271 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 63,013 times