Hot Topics:   Security    Policy & Regulation    Top-Level Domains    Internet Governance    Domain Names    Access Providers    Cyberattack    more...

Featured Blogs

AfPIF Brings Together Internet Players

Mwendwa Kivuva If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world. more»

Does Apple's Cloud Key Vault Answer the Key Escrow Question?

Steven Bellovin In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krstić) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more»

Internet Access: A Chokepoint for Development

Said Zazai In the 1980's internet connectivity meant allowing general public to communicate and share knowledge and expertise with each other instantly and where it was not possible otherwise. Take the story of Anatoly Klyosov, connecting Russia to the western world for the first time in 1982, as an example. A bio-chemist who was not allowed to leave the soviet territory for security reasons. The internet enabled him to participate in meetings with his counterparts at Harvard University, University of Stockholm and beyond. more»

Challenging UDRP Awards in Courts of Competent Jurisdiction

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive forum for the resolution of domain names accused of cybersquatting even though registration agreements use the word "mandatory" in the event of third-party claims. The UDRP is mandatory only in the sense that respondents are "obliged by virtue of the [registration] agreement to recognize the validity of a proceeding initiated by a third-party claimant." more»

Examining IPv6 Performance - Revisited

Geoff Huston Every so often I hear the claim that some service or other has deliberately chosen not to support IPv6, and the reason cited is not because of some technical issue, or some cost or business issue, but simply because the service operator is of the view that IPv6 offers an inferior level service as compared to IPv4, and by offering the service over IPv6 they would be exposing their clients to an inferior level of performance of the service. more»

China's QUESS and Quantum Communications

Paul Budde In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more»

Security Against Election Hacking - Part 2: Cyberoffense Is Not the Best Cyberdefense!

Andrew Appel State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more»

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

Doug Isenberg In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more»

Security Against Election Hacking - Part 1: Software Independence

Andrew Appel There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more»

Video: Interview with Jari Arkko at IETF 96 in Berlin

Dan York Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more»

ICANN the Machine…

Shaul Jolles ICANN's new gTLD expansion is really quite an ingenious ploy to grow the once small California non-profit into an unstoppable machine, worth hundreds of millions of dollars, which soon plans to finally be free from any external oversight. I have no doubt that ICANN pats itself on the back for pulling the wool over so many eyes, including stakeholders, new gTLD applicants, politicians, and the global general public. more»

Reselling Domain Names on the Secondary Market: Bona Fide Offering, or Not?

Gerald M. Levine On the question of reselling domain names on the secondary market, a dissenting panelist in a 2005 case observed that "[t]here is no doubt Respondent is in the business of being a reseller of domain names that consist of common English words" and then suggested that the "fundamental question before the Panel is whether or not such a business should be allowed under the UDRP." He concluded that such a business should not be allowed... more»

Buying Multiple Domains Makes Sense

Jean Guillon Companies usually use one single domain name for their online activities but then, more questions pop up: SEO, Infringement, Future of the company, monitoring online competition... If buying multiple domain names answers some of these questions, there is a way to do it. Here is how... It often happens that the domain name of a company is neither the generic keyword of its core business nor a keyword that necessarily appears attached to its name. more»

Complexity and Crashes

Russ White It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem. more»

A Journey Into the Surreal: The GOP Protecting "Internet Freedom" With 25 Friends

Anthony Rutkowski Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more»

News Briefs

Italy's Earthquake Rescuers Ask Locals to Unlock Their Wi-fi to Assit in Search and Rescue

The Italian Red Cross says residents' home networks can assist with communications during the search for survivors following Wednesday's 6.2 magnitude earthquake which struck central Italy killing over 240 people. ›››

Singapore Plans to Cut Off Internet Access for Government Agencies

"Singapore is planning to cut off web access for public servants as a defence against potential cyber attack," according to a report today in the Guardian. ›››

ICANN Gets an In-House Physical Security Operations Professional

ICANN has announced a new hire, Mark Jardina – an expert in global security and health and safety as Vice President of Security Operations. ›››

BT Confirms IPv6 Will Be Enabled on Their Network as Early as Fall

BT, United Kingdon's ISP, has confirmed IPv6 will finally be enabled on their network from this Autumn 2016 – but it will be early 2017 before all of their customers can use it, Mark Jackson reported today in ISPreview.co.uk. ›››

Iran Launches Its First Private Cloud Data Center

Iran has officially launched its first cloud data center in Tehran during a ceremony attended by the Minister of Communication and Information Technology," according to reports from local news sites. ›››

Russian Central Bank Announces Mandatory Cyber-Security Regulations for Domestic Banks

"Russian banks will be faced with a whole range of new regulations, and penalties for non-compliance, when it comes to cyber-security, according to the country's Central Bank," Eugene Gerden reported today in SC Magazine UK ›››

IPv6 Now Dominant Protocol for Traffic Among Major US Mobile Providers

"Major Mobile US Networks Pass 50% IPv6 Threshold," reports Mat Ford, Technology Program Manager at the Internet Society (ISOC). ›››

Clothing Retailer Eddie Bauer Confirms Point-Of-Sale Malware, All US, Canadian Stores Infected

In a press release yesterday evening, retailer Eddie Bauer confirmed a point-of-sale malware infection suspected by some sources as early as beginning of last month. ›››

Massive Cyberattack Aimed at Flooding .Gov Email Inboxes With Subscription Requests

"Massive Email Bombs Target .Gov Addresses," Brian Krebs writes in Krebs on Security: "Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists." ›››

NTIA Asks for Input from Organizations That Have Implemented IPv6

National Telecommunications and Information Administration (NTIA) released a stement today seeking input as part of its efforts to increase IPv6 adoption. ›››

Chinese Cloud Vendors Benefitting from Home-Field Advantage While Expanding Globally

China's home grown firms are not only grabbing domestic businesses but also venturing to different countries across the world. On the other hand, foreign players face regulatory walls that make it difficult to tap businesses in China." Saibal Dasgupta reporting today in VOA ›››

Code Released by 'Shadow Brokers' Raises Alarming Concerns on Whether NSA Was Hacked

The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. ›››

NTIA to Allow IANA Functions Contract to Expire October 1

On Friday, ICANN informed NTIA that it has completed or will complete all the necessary tasks called for in the transition proposal by the end of the contract term. ›››

Mysterious Hacker Claims to Have Hacked a Group Linked to the NSA

A mysterious hacker or hackers going by the name 'The Shadow Brokers' claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files. ›››

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. ›››

ICANN Announces Newly Created Organization to Replace IANA

ICANN has announced the name of the newly incorporated organization, Public Technical Identifiers (PTI), as a nonprofit entity to begin operation as 'Post-Transition IANA'. ›››

Data Growth, IoT Will Lead to Unlimited Energy Consumption If Not Controlled, Scientists Warn

Researchers from Lancaster University's School of Computing and Communications have warned that the rapid growth of remote digital sensors and devices connected to the internet -- Internet of Things -- has the potential to bring unprecedented and, in principle, almost unlimited rises in energy consumed by smart technologies. ›››

Google Shows Signs of Agressive Plan for Nationwide Wireless Broadband

Google Fiber is planning a move from the expensive and slow-moving physical pipes strategy to deployment of wireless network, according to an FCC filing. ›››

Syria Shuts Down Internet to Prevent Cheating During National High School Exams, Say Insiders

Early this morning in Syria, the Internet was almost entirely down for four hours. It was the ninth such outage since 31 July 2016 -- each one lasting from approximately 4am to 8am local time. ›››

Swimming Australia Website Comes Under DDoS Attack in Wake of Allegations Against Chinese Swimmer

The website of Swimming Australia has come under DDoS attack just hours after the Australian Bureau of Statistics went back online following a similar attack bringing the online census initiative to a halt. ›››

Popular News – Last 30 Days

Recent Comments

ICANN the Machine...
Examining IPv6 Performance - Revisited
ICANN the Machine...
ICANN the Machine...

Cartoons  –  From the Community

ICANN Cuts the High Risk Cake

Sponsored Topics

Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25
Afilias

DNS Security

Sponsored by
Afilias
Verisign

Security

Sponsored by
Verisign

Industry Updates

LogicBoxes Launches the New Elite Reseller Program

LogicBoxes LogicBoxes, the leading provider of web presence automation solutions for Web Hosts, Domain Resellers and ICANN Registrars, today announced the launch of its new Elite Reseller Program. This program lays a strategic focus on fast-growing Web Hosting Providers. more»

Miss.Africa Announces 2016, Round II Seed Funding Tech Initiative for Women in Africa

DotConnectAfrica In a #STEM4girls Pan-African campaign, the Miss.Africa program is mobilizing a Round II Seed Fund for Tech initiatives in Africa that will avail small grants to support women and girls in the Science, Technology, Engineering and Mathematics (STEM) fields to launch or expand their own initiatives. more»

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Neustar Neustar this week published a research report, "DNSSEC: How Savvy DDoS Attackers Are Using Our Defenses Against Us," detailing how Domain Name System Security Extensions (DNSSEC) can be subverted as an amplifier in Distributed-Denial-of-Service (DDoS) attacks. more»

Airpush Chooses DeviceAtlas to Provide Device Awareness to Mobile Ad Network

Afilias - Mobile & Web Services Mobile Advertising firm Airpush and Afilias announced today that DeviceAtlas is now powering device detection and targeting on its advertising network for Android and iOS apps. more»

DeviceAtlas Releases Q2 2016 Mobile Web Intelligence Report, Apple Loses Browsing Market Share

Afilias - Mobile & Web Services DeviceAtlas, a leading supplier of intelligence on mobile devices, today released its quarterly Mobile Web Intelligence Report for Q2 2016, which analyzes mobile device traffic to hundreds of thousands of websites around the world. more»

Afilias Acquires Premium TLDs .ARCHI, .BIO and .SKI

Afilias Afilias announces the acquisition of StartingDot, the Registry Operator for 3 new TLDs: .ARCHI, .BIO and .SKI. The acquisition agreement is part of Afilias' ongoing program of acquiring new TLDs to add to its portfolio. StartingDot's TLDs are a good fit with other Afilias TLD's such as .ORGANIC, .GREEN, .BLUE, and .PRO. more»

Effective Strategies to Build Your Reseller Channel (Webinar)

LogicBoxes Join us on Wednesday, August 10th, for a webinar with Shridhar Luthria, Executive Vice President for Channel Businesses at the Endurance International Group, where he'll help you piece together your reseller strategy for your growing web presence business. more»

Radix Adds Dyn as a DNS Service Provider

Radix Radix has contracted global industry leader Dyn to become its second supplier of DNS services for all its new domains. Dyn's DNS service will run concurrently with Radix's existing DNS services, thereby adding a layer of DNS redundancy. more»

Facilitating a Trusted Web Space for Financial Service Professionals

Boston Ivy New Top Level Domains, .CFD and .Spreadbetting domain extensions act as a mark of trust to potential clients. A unique verification service provided by the domain Registry, Boston Ivy, is changing the landscape of the internet and the world of online trading. more»

Ready or Not, 5 Big Tech Trends Headed Your Way

Boston Ivy With so much innovation in the fast moving world of technology, it is difficult to have a clear crystal ball but here we present our synopsis of what we believe might lie in store! more»

What are the World’s Most Popular Smartphones

Afilias - Mobile & Web Services DeviceAtlas a leading supplier of intelligence on mobile devices, has released its latest statistics on most popular smartphones in different countries based on the amount of web traffic these phones generated in Q1 2016. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Dave Burstein
Editor, DSL PrimeJoined on Apr 10, 2008

Andrew Sullivan
Director of Labs at DynJoined on Mar 27, 2012

Michael Geist
Chair of Internet and E-commerce LawJoined on Jan 09, 2004

Jon Nevett
Co-Founder, Donuts Inc.Joined on Dec 06, 2005

Richard Henderson
Active member of the At Large constituencyJoined on Oct 11, 2003

Paul Budde
Managing Director of Paul Budde CommunicationJoined on Feb 04, 2009

Josh Ray
Vice President of Cybersecurity Intelligence at VerisignJoined on May 09, 2014

Rick Rumbarger
Technology ExecutiveJoined on Aug 15, 2010

Christa Taylor
Christa Taylor is the CEO of DotTBAJoined on Nov 30, 2012

Leonard Grace
Founder & Editor - Broadband ConvergentJoined on May 01, 2010

Timothy Denton
lawyer, former national regulator (CRTC)Joined on Sep 29, 2003

John Horton
President of LegitScriptJoined on May 13, 2010

Roy Balleste
Law Library Director & Professor of LawJoined on Feb 29, 2012

John Matson
Co-Founder and COO of ArchitelosJoined on Jul 11, 2011

Ross Rader
Director of Innovation & ResearchJoined on Jun 14, 2003

Peter HJ van Eijk
Cloud Computing Coach, Author and SpeakerJoined on Aug 18, 2006

Sascha Meinrath
Research Director, New America Foundation; Principal, The Ethos GroupJoined on Aug 11, 2008

Kathy Brown
President and CEO, Internet SocietyJoined on Oct 20, 2015

Jeannie McPherson
Senior Manager of Corporate Communications, VerisignJoined on Dec 12, 2014

Olaf Kolkman
Chief Internet Technology Officer (CITO), Internet SocietyJoined on Apr 16, 2015

David P. Reed
Joined on May 14, 2008

Jonathan Zittrain
Professor of Law at Harvard Law SchoolJoined on Nov 09, 2005

Phillip Hallam-Baker
Consultant, Author, SpeakerJoined on May 22, 2010

Tobias Flaitz
Chief Executive Officer at Sedo Holding AGJoined on Oct 05, 2011

Rebecca MacKinnon
Journalist and activist; Co-founder, Global Voices OnlineJoined on Jul 22, 2005

Frank Schilling
FounderJoined on Aug 24, 2006

Jovan Kurbalija
Director of DiploFoundation & Head of Geneva Internet PlatformJoined on Apr 19, 2004

Bill Thompson
Journalist, Commentator and Technology CriticJoined on Sep 09, 2004

Henry Lancaster
Senior Analysts at Paul Budde CommunicationJoined on Jun 04, 2009

Juha Holkkola
CEO of FusionLayer, Inc.Joined on Nov 15, 2011