Hot Topics:   Cybersecurity    Domain Names    Policy & Regulation    Cybercrime    Cyberattack    Whois    Mobile Internet   

Featured Blogs

The Operationalization of Norms and Principles on Cybersecurity

Maarten Van Horenbeeck With two simultaneous processes getting underway in the UN General Assembly's First Committee, the UN Group of Governmental Experts (GGE) and the Open-Ended Working Group (OEWG) on Cybersecurity, and several technology and multi-stakeholder initiatives pushing cybersecurity improvement, the world of cyber norms has become both more interesting and more complicated. more

DoH Creates More Problems Than It Solves

Richard Bennett Unlike most new IETF standards, DNS over HTTPS has been a magnet for controversy since the DoH working group was chartered on 2017. The proposed standard was intended to improve the performance of address resolutions while also improving their privacy and integrity, but it's unclear that it accomplishes these goals. On the performance front, testing indicates DoH is faster than one of the alternatives, DNS over TLS (DoT). more

What Is the Purpose of ICANN's Comment Periods?

Michael Karanicolas Almost every institution which purports to provide space for public accountability includes some sort of formalized process by which the public can have their say. And in almost every instance, they struggle with a tension between the desire to provide a commenting process which is meaningful and substantive (or, at least, which appears to be so), and a desire to adopt whatever course of action the institution thinks is best. more

What is a Security Mechanism?

Steven Bellovin Orin Kerr recently blogged about a 9th Circuit decision that held that scraping a public web site (probably) doesn't violate the Computer Fraud and Abuse Act (CFAA)... On its surface, it makes sense – you can't steal something that's public – but I think the simplicity of the rule is hiding some profound questions. One, I believe, can most easily be expressed as "what is the cost of the 'attack'"? That is, how much effort must someone expend to get the data? Does that matter? Should it? more

IGF Best Practice Forums, an Opportunity to Bring Your Experience to the Policy Debate

Wim Degezelle In the run-up to the 14th Internet Governance Forum in Berlin, Germany, 25 to 29 November, different groups are discussing best practices pertaining to specific internet governance policy questions. These groups are open and thrive on your input and experiences. Their findings will be presented at the IGF and published shortly after. The IGF Best Practice Forums intend to inform internet governance policy debates by drawing on the immense and diverse range of experience and expertise... more

The Internet of the Future – What Happens Behind the Scenes?

Christoph Dietzel Today's Internet is a critical infrastructural element whose continued development influences industries, cultures, and the private space of most individuals. However, the world-encompassing network sometimes needs to be adapted to new requirements to keep pace with current innovations. We have recently seen accelerating development of Internet usage on the user side. Whether it is online shopping's expansion or the greater distribution of mobile devices or streaming services... more

Busy Skies: Weighing the Downside of Launching Huge Numbers of Satellites for Broadband

Doug Dawson I was looking over the stated goals of the broadband satellite companies and was struck by the sheer numbers of satellites that are being planned. The table further down in the blog shows plans for nearly 15,000 new satellites. To put this into perspective, consider the number of satellites ever shot into space. The United Nations Office for Outer Space Affairs (NOOSA) has been tracking space launches for decades. more

Corporate Domain Name Management Becoming More Difficult – Is Anyone Surprised?

Elisa Cooper Brandsight recently concluded their Third Annual Domain Management Survey. Designed to uncover issues of greatest concern to corporate domain name professionals, the survey was sent to more than 300 companies. The companies that responded spanned all verticals, ranging from financial services to high-tech to consumer packaged goods. Of those that responded, 18% had portfolios smaller than 500 domains... more

Keeping a Free and Open Internet Starts at the Root

Greg Thomas ​​Dynamics at the Internet's core erode stakeholder legitimacy and aid Sino-Russian efforts for multilateral control. ​​​At the beginning of what became a prolonged process for privatization, the U.S. Government established a framework of fundamental guiding principles for governance of the Internet's root. These principles were designed to work to preserve a free and open nature for a global network that was to be elastic, extensible, and – at more than two decades – enduring. more

The Utility Formerly Known As WHOIS

Matt Serlin Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

Inter-Satellite Laser Link Update

Larry Press Inter-satellite laser links (ISLLs) and electronically steerable flat panel antennas are critical technologies for constellations of low-Earth orbit (LEO) Internet-service satellites. Low-cost antennas are critical for the mass consumer market, and ISLLs are required for an effective Internet backbone in space. In an earlier post, we saw that progress is being made on antennas; this one looks at ISLLs. more

DNS-over-HTTPS: Privacy and Security Concerns

Brian Dickson The design of DNS included an important architectural decision: the transport protocol used is user datagram protocol (UDP). Unlike transmission control protocol (TCP), UDP is connectionless, stateless, and lightweight. In contrast, TCP needs to establish connections between end systems and guarantees packet ordering and delivery. DNS handles the packet delivery reliability aspect internally and avoids all of the overhead of TCP. There are two problems this introduces. more

How Domain Data Helps Thwart BEC Fraud

Jonathan Zhang It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

Is There a Business Case for Fast Cellular?

Doug Dawson We've gotten a glimpse of the challenges of marketing faster cellular usage since the two major cellular providers in South Korea made a big push in offering ultrafast cellular broadband. South Korea has two primary cellular carriers – SK Telecom and KT – and both have implemented cellular products using millimeter wave spectrum in Seoul and other dense urban areas. more

5G Real Security Threats Lost in Trump's Twitter Diplomacy

Stacie Hoffmann A new report on 5G and geopolitics by Oxford Information Labs details the complex landscape of 5G security. Importantly, it draws out how a variety of proven technical concerns around the quality of Huawei security practices and equipment are drowned out by the US' Twitter diplomacy. Critical international dialogue on genuine cybersecurity concerns relating to 5G and Huawei are being lost in the noise of the US-China trade war. more

News Briefs

281 Arrested Worldwide by US Federal Authorities in Connection With Business Email Compromise Scheme

U.S. Department of Justice says federal authorities successfully carried out a "significant" coordinated effort to disrupt Business Email Compromise (BEC) schemes designed to intercept and hijack wire transfers from businesses and individuals. more

The Insecurity of the IoT is Only Getting More Profound, Says Principal Researcher at F-Secure

"Three years after Mirai first appeared, and two years after WannaCry, it shows that we still haven't solved the problems leveraged in those outbreaks," said F-Secure Principal Researcher Jarno Niemela. more

51 CEOs Call on US Congress for Urgent Nationwide Data Privacy Law Overriding State-Level Laws

A letter, signed by 51 CEOs, was sent to U.S. House and Senate and leaders of other committees today urging policymakers to pass a comprehensive national data privacy law. more

Ransomware Causes 15 Schools in Arizona To Stay Closed For a Second Day

The Flagstaff Unified School District (FUSD), in Arizona which consists of 15 schools and over 9,600 students, canceled classes on both Thursday and Friday after a ransomware virus was found on multiple servers. more

Phishing Attacks Targeting Executives Now Top Cybersecurity Insurance Claims, Says AIG

A new report published by the insurance giant, AIG, claims phishing attacks via email, often targeted at senior executives, has overtaken ransomware. more

Hong Kong ISPs Oppose Government Plans for Internet Restrictions Without Industry Consultation

A statement released by the Hong Kong Internet Service Providers Association (HKISPA) denouncing any plans that would restrict Hong Kong's open internet network. more

By 2021 Cost of Cybercrime to Top Annual Natural Disasters and Global Drug Trade Costs, Says Report

By 2021, it is estimated that cybercrime will cost the global economy more than $6 trillion in damages, exceeding annual costs for natural disasters and the global drug trade. more

Australia to Block Domain Names That Host Extremist Content During Attacks

Following the Christchurch massacre in March which resulted in the killing of 51 worshippers at two New Zealand mosques, Australian Prime Minister Scott Morrison while attending the G7 summit in France, said the government will establish a new framework to block domains linked to violent attacks. more

WIPO Becomes First Non-Chinese Entity to Provide Domain Dispute Resolution Services for China's .cn

WIPO's Arbitration and Mediation Center earlier this month became the only non-Chinese entity to provide domain name dispute resolution services for the .CN and .中国 (China) country code Top-Level Domain (ccTLD). more

Huawei Founder in a Staff Memo Warns Company Is Facing a 'Live-or-Die Moment'

In a memo sent to employees on Monday, Ren Zhengfei, the 74-year-old Huawei founder, has asked its employees to work aggressively towards sales targets and warned that the company is facing a "live-or-die moment." more

Google Showing Signs of Increased Concerns Over Rising Data Privacy Scrutiny

Earlier this year, Google quietly terminated its "Mobile Network Insights" service, which provided wireless carriers globally, information on network performance in various locations. more

Study Reveals U.S. Carriers Throttle Online Video on Their Mobile Networks Even When Not Congested

A study conducted by researchers at Northeastern University and the University of Massachusetts Amherst involving 650,000 tests indicates U.S. carriers are throttling online video on their mobile networks regardless of whether or not those networks are congested. more

Irland Leads Europe's .eu Domain Registrations in Q2

The latest report released by EURid, the operator of Europes .eu domain, has attributed 18% of the growth of the European domain to Ireland followed by Portugal with 16.1% and Norway with 10.8%. more

Huawei Launches Its Own Operating System, Says Its Completely Different From Android and iOS

Huawei announces a new homegrown operating system called HarmonyOS. The Chinese tech giant launched the new OS during its developer conference on Friday, calling it "completely different from Android and iOS." more

There's a Full-On War for Cybersecurity Talent, CEOs Forking Millions to Fill Roles

With companies realizing the threat of hefty fines, lawsuits, and executive resignations that can follow security breaches, companies are scrambling to scoop up scarce security experts. more

URS Is a Bad Fit for .ORG, Says EFF

The online digital rights group, Electronic Frontier Foundation (EFF) on Tuesday published a post warning ICANN's latest move requiring the use of Uniform Rapid Suspension (URS) for .org domain names is a "bad fit." more

8chan Website Pushed Offline Over Ties to the Mass Shooting in El Paso

The notorious social networking website 8chan was taken offline on Monday afternoon following discontinuation of support from various service providers to the platform over its links to the mass shooting in El Paso, Texas. more

OneWeb Fails in Latest Attempt to Get Russian Approval for Its Worldwide Internet Coverage Plan

Russian State Commission for Radio Frequencies has denied the global satellite communications company OneWeb to use a certain band of radio frequencies in Russia that the company seeks as part of its plan to launch hundreds of satellites into orbit to provide worldwide internet coverage. more

Close to 200K Phishing Domains Discovered in a 5-Month Span, 66% Targetted Consumers, Akamai Reports

Between December 2, 2018 and May 4, 2019, 197,524 phishing domains were discovered, 66% of which directly targeted consumers according to the latest State of the Internet report by Akamai. more

A Seattle Woman Charged With Capital One Data Theft Affecting 106 Million People

Major US bank Capital One Financial Corporation confirmed Monday evening that unauthorized access was made by an outside individual who obtained "certain types of personal information" on credit card products and Capital One credit card customers. more

Most Read – Last 30 Days

Recent Comments

Not So Private Thoughts at IETF 105
Are You Ready for 10 Gbps?
The Ageless Warning of Icarus

Topics

IP Addressing

Sponsored byAvenue4 LLC

Whois

Sponsored byWhoisXML API

New TLDs

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

Cybercrime

Sponsored byThreat Intelligence Platform

DNS Security

Sponsored byAfilias

Domain Names

Sponsored byVerisign

Industry Updates

Domain & IP Intelligence: An Advantage to Managed Detection and Response

WhoisXML API Outsourcing may not always have had the best connotation. In the context of cybersecurity, however, the activity is a vital one and often even the only real alternative for many small- and medium-sized organizations. more

Afilias Thanks Desiree Miloshevic for 12 Years of Service to ISOC

Afilias Afilias, the world's second largest domain name registry, today thanks Desiree Z. Miloshevic for her leadership and service to the Board of Trustees of the Internet Society. more

How to Address Blended Threats with Domain Data

WhoisXML API Fighting off individual threats is challenging enough, but things get complicated, and the results more damaging when organizations face blended threats. The practice of combining security threats such as malware and attack vectors confounds if not overwhelms victims, making them easy prey. more

Website Categorization: Enhancing URL Filtering for MSSPs

WhoisXML API Although the Internet offers many opportunities, it also comes with a wide variety of issues. Cybercrime is rampant, and not knowing how to navigate the Web safely can lead to severe consequences. Phishing is one of the top concerns for enterprises. And managed security service providers (MSSPs) have decided that URL filtering is one way to resolve the issue. more

Should Cybersecurity Teams Consider Next-Generation Firewalls?

WhoisXML API Cyber attacks and hacking methodologies are growing in complexity over time. This concern has led many enterprises to look toward more advanced capabilities to enhance their cybersecurity. One solution they have found is utilizing next-generation firewalls. more

How Website Categorization Technology Can Assist MDR Teams

WhoisXML API The threat landscape is more complicated than it was before. Many organizations are thus starting to weigh their options on how to protect their data best. Amid the persistent cybersecurity skills shortage, companies are wondering if they should turn to outsourced services. more

DeviceAssure Wins Award for Mobile Innovation at IHS Showstoppers

Afilias Mobile & Web Services The IHS Markit Innovation Awards recognizes innovative products from companies exhibiting at ShowStoppers at IFA in Berlin. IHS Markit is a world leader in critical information, analytics and business solutions for major industries and markets, helping drive economies worldwide. more

101domain Expands Security Offering to Include Nearly Two Dozen New SSL Certificate Solutions

Afilias 101domain has added nearly two dozen new SSL Certificates powered by Sectigo, the world's largest certificate authority. Partnering with a reputable certificate authority is just as important as selecting the right kind of certificate. more

Can Website Categorization Support Fraud Monitoring?

WhoisXML API Detecting and preventing fraud have become in-demand over the years. As such, expectations from fraud solution providers have gone up as well. more

How Domain Data Can Enrich an MSSP's Threat Intelligence

Threat Intelligence Platform (TIP) Outsourcing security monitoring and management has become a practical option for organizations that lack the budget to take care of their own threat detection and incident response needs. As such, small and medium-sized businesses (SMBs) are turning to external security providers. more

Using Domain Name Intelligence to Counter E-Commerce Platform Vulnerability Exploit Attacks

Ipify In 2018, e-commerce sites proved to be a favored cyberattack target. This trend remains constant this year, as online shops continued to be red-flagged and blacklisted by cybersecurity companies. more

4 Cybersecurity Professionals That Can Benefit from Threat Intelligence

Threat Intelligence Platform (TIP) There is a misconception that threat intelligence is something that only specialists in the cybersecurity field can analyze and understand. In truth, threat intelligence is a good resource that can be of use in any cybersecurity role. It is something that anyone who cares about or works toward network security will find beneficial. more

Verisign Q2 2019 Domain Name Industry Brief: Internet Grows to 354.7 Million Domains in Q2 of 2019

Verisign Verisign today released the latest issue of the Domain Name Industry Brief, which shows that the second quarter of 2019 closed with 354.7 million domain name registrations across all top-level domains (TLDs), an increase of 2.9 million domain name registrations, or 0.8 percent, compared to the first quarter of 2019. more

How Threat Intelligence Can Solve 3 Common SIEM Problems

Threat Intelligence Platform (TIP) Security information and event management (SIEM) solutions are an excellent way to get incident data from an organization's network and put them all in one place. But as a network's complexity grows, so do the problems these SIEM vendors face with regard to providing the right products to clients. more

The Growing Need for Managed Detection and Response Services

WhoisXML API A recent prediction from Cybersecurity Ventures states that the cybersecurity sector is going to have as many as 3.5 million unfilled positions by the year 2021. That is why managed detection and response (MDR) services are now more important than ever. more

Fraud Protection Measures Against Malicious New Domains

WhoisXML API Many domain names are registered each day and so become part of the Domain Name System (DNS). In fact, research shows that at least two new registrations are seen per second. Although most of these are done for commercial and other legitimate purposes, not everyone who registers a domain has good intentions. more

Startups on .Tech Domains Raise $2B+ in VC Funding

Radix Radix, one of the world's leading new top-level domains registries, today announced that at least 170 startups on .tech have raised over $2B in VC funding between 2017 to 2019. These startups are spread across industries such as Auto, Crypto, Mobility, Energy, etc. more

Leading Voices  –  From our corporate sponsors

John Kane Vice President of Corporate Services, Afilias 4 posts viewed 54,393 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 137,050 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 24,708 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 19,108 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 6 posts viewed 44,332 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 8,408 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 140,118 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 62,238 times
Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 44,915 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 211,775 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 34,291 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 15,149 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 12,307 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 584,137 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 181,371 times