Hot Topics:   Policy & Regulation    Security    Law    Domain Names    Internet Governance    Internet of Things    Cyberattack    more...

Featured Blogs

Bug Bounty Programs: Are You Ready? (Part 1)

Gunter Ollmann The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more»

An Ethnographic Study - What are Cubans Doing Online?

Larry Press Aida Zekić, a student at the University of Uppsala, Sweden has published her master's thesis, "Internet in Public: an ethnographic account of the Internet in authoritarian Cuba." The thesis reports on interviews of 50 Cuban Internet users at nine WiFi hotspots in Havana during September and October 2016. She asked pre-planed, but mostly open-ended questions of 25 men and 25 women. She tried to identify people between 25 and 50 years old, but a few were a little older. more»

FAKE45: Trump Administration Illegitimacy Under International Law

Anthony Rutkowski The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more»

Differing UDRP Decisions Show That Facts Matter

Doug Isenberg "Past performance does not necessarily predict future results." That's what the U.S. Securities and Exchange Commission requires mutual funds tell investors. But it's also true about domain name disputes. Cases in point: In four recent proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), the operator of a large bank won two decisions but lost two others, despite a track record of having won more than 30 previous UDRP disputes. more»

Help Us Answer: What Will the Internet Look Like in 10 Years?

Sally Shipman Wentworth What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more»

If Slate Comes in Standard Sizes, Why Not Broadband?

Martin Geddes Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more»

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

Khaled Fattal While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more»

How a 'Defensive Registration' Can Defeat a UDRP Complaint

Doug Isenberg A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more»

Zero-Touch Provisioning… Really?

Ronan Bracken Zero-touch provisioning (ZTP) -- whatever does that mean? Of course, it is another marketing term. I think the term "closer to zero touch provisioning" is probably better, but CTZTP -- as opposed to ZTP -- is a bit more of a mouthful. Whenever I hear language like this that I'm not familiar with, I get struck by a bolt of curiosity. What is this new and shiny phrase that has just appeared as if from nowhere? more»

History is Written and Revised by the Winners - Can the Internet Archive Change That?

Larry Press I was naively optimistic in the early days of the Internet, assuming that it would enhance democracy while providing "big data" for historians. My first taste of that came during the Soviet coup attempt of 1991 when I worked with colleagues to create an archive of the network traffic in, out and within the Soviet Union. That traffic flowed through a computer called "Kremvax," operated by RELCOM, a Russian software company. The content of that archive was not generated by the government or the establishment media -- it was citizen journalism... more»

Fairness & Due Process Require Changes to ICANN's "Updated Supplementary Procedures" to the IRP

Kathy Kleiman The Updated Supplementary Procedures for Independent Review Process ("IRP Supplementary Procedures") are now up for review and Public Comment. Frankly, there is a lot of work to be done. If you have ever been in a String Objection, Community Objection, or negotiated a Consensus Policy, your rights are being limited by the current way the IRP Supplementary Procedures proposal is structured. With timely edits, we can ensure that all directly-impacted and materially-affected parties have actual notice of the IRP proceeding... more»

Should You Pay Ransomware Demands?

Rachel Gillevet Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more»

New Report on "State of DNSSEC Deployment 2016" Shows Continued Growth

Dan York Did you know that over 50% of .CZ domains are now signed with DNS Security Extensions (DNSSEC)? Or that over 2.5 million .NL domains and almost 1 million .BR domains are now DNSSEC-signed? Were you aware that around 80% of DNS clients are now requesting DNSSEC signatures in their DNS queries? And did you know that over 100,000 email domains are using DNSSEC and DANE to enable secure email between servers? more»

How a Plaintiff Was Undeceived and Lost at Spam Litigation - What Nobody Told You About!

Robert Cannon Back in 2003, there was a race to pass spam legislation. California was on the verge of passing legislation that marketers disdained. Thus marketers pressed for federal spam legislation which would preempt state spam legislation. The Can Spam Act of 2003 did just that... mostly. "Mostly" is where litigation lives. According to the Can Spam Act preemption-exception... more»

CircleID's Top 10 Posts of 2016

The new year is upon us and it's time for our annual look at CircleID's most popular posts of the past year and highlighting those that received the most attention. Congratulations to all the 2016 participants and best wishes to all in the new year. more»

News Briefs

China Sets Up $14.6 Billion Internet Investment Fund

China's government has established a 100 billion yuan (US$14.5 billion) state fund to invest, nurture and support internet companies and spearhead the country's technological innovations and economic transformation into the so-called 'Internet Plus' era. ›››

CADNA Returns to Lobby for Stronger Cybersquatting Laws

Coalition Against Domain Name Abuse, the lobby group that campaigned for stronger cybersquatting laws and against new gTLDs, is back. ›››

Trump Expected to Name FCC Commissioner Ajit Pai as Chairman

"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. ›››

Outgoing FCC Chairman Warns Republicans Against Overturning Net Neutrality

"Outgoing U.S. Federal Communications Commission Chairman Tom Wheeler warned Republicans against dismantling the Obama administration's landmark 'net neutrality' protections," David Shepardson reporting in Reuters. ›››

New Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT Application Security

Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today from Ponemon Institute, IBM Security, and Arxan Technologies. ›››

Canadian Energy Firms at Bigger Risk of Cyberattack

The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. ›››

Ukraine's Power Outage Due to Cyberattack, Says Country's National Power Company

A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack, according to Ukraine's National power company, Ukrenergo which hired investigators to help it determining the cause. ›››

Former New York City Mayor Rudy Guliani Appointed to "Chair" Cyber Task Force

Transition spokesman Sean Spicer told reporters today that former New York City Mayo, Rudy Giuliani will "chair" the cyber task force that Trump announced last Friday. The task force is given three months from Trump's inauguration to deliver a cybersecurity plan. ›››

U.S. Department of Commerce Issues IoT Advancement Guidelines

The Department of Commerce issues a green paper outlining guiding principles and ways to support the advancement of the Internet of Things (IoT). ›››

Alphabet Shuts Down Its Solar-Powered Internet Drone Program

"Alphabet cuts former Titan drone program from X division, employees dispersing to other units," reports Seth Weintraub today in 9TO5Google. ›››

Ransomware Crime Bill Goes into Effect in the State of California

As of January 1, the delivery of ransomware is illegal in California as per Senate Bill 1137 going into effect. ›››

FTC Announces Internet of Things Challenge, Offers $25,000 for Best Technical Solution

The Federal Trade Commission is challenging the public to create an innovative tool to help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things. ›››

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. ›››

Court Refuses Injunction in .africa TLD Case

"DotConnectAfrica's attempt to have ICANN legally blocked from delegating the .africa gTLD to rival applicant ZACR has been denied," Kevin Murphy reporting in Domain Incite. ›››

Trump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity, Counterterrorism Role

President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced Tuesday morning," Michael D. Shear reporting in the New York Times. ›››

China Says It Will Use All Means, Including Military, to Ensure Online Security

"Beijing vowed on Tuesday to use all necessary means, including military ones, to wipe out subversion and attempts to undermine its sovereignty in cyberspace," Zhuang Pinghui reporting in South China Morning Post. ›››

Tom Wheeler Announces Resignation as FCC Chairman

Federal Communications Commission Chairman Tom Wheeler has announced he will leave the agency on January 20, the day of President-elect Donald Trump's inauguration. ›››

Google Begins Publicly Sharing National Security Letters

In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. ›››

China Shuts Down Thousands of Websites for 'Harmful', Obscene Content

China has shut down or 'dealt with' thousands of websites for sharing 'harmful' erotic or obscene content since April, the state's office for combating pornography and illegal publications announced on Thursday. ›››

Yahoo Reveals Over One Billion More Accounts Have Been Hacked

Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. ›››

Popular News – Last 30 Days

Recent Comments

ICANN Fails Consumers (Again)
The Christmas Goat and IPv6 (Year 7)
Should You Pay Ransomware Demands?
ICANN Fails Consumers (Again)
ICANN Fails Consumers (Again)

Sponsored Topics

Afilias

DNS Security

Sponsored by
Afilias
Verisign

Security

Sponsored by
Verisign
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25

Industry Updates

Michele Neylon Appointed Chair Elect of i2Coalition

i2Coalition The Internet Infrastructure Coalition (i2Coalition) announced that Blacknight CEO, Michele Neylon has been appointed Chair Elect of its Board of Directors. Mr. Neylon's position as Chair Elect became effective on January 1st, 2017 and will assume his role as Chair on January 1st, 2018. more»

Neustar to be Acquired by Private Investment Group Led by Golden Gate Capital

Neustar Neustar today announced that it has entered into a definitive agreement to be acquired by a private investment group led by Golden Gate Capital in a transaction valued at approximately $2.9 billion, including debt to be refinanced. more»

Startup League Reports from WebSummit, Lisbon

Radix Radix, the portfolio Registry behind 8+ popular extensions such as .online, .store, .tech took its latest venture, the Startup League to its first conference, WebSummit earlier this week. more»

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

Verisign Verisign has released its Q3 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

2016 U.S. Election: An Internet Forecast

i2Coalition The unexpected election of Donald Trump, along with continued Republican control of both houses of Congress will have a big impact on our US priorities. While the outlook remains unclear, we've prepared the memo below examining the initial impact the election may have on issues that matter to Internet infrastructure companies and organizations. more»

.SPACE Becomes the Choice of the First Ever Space Nation Asgardia

Radix A group of scientists launched the first ever space nation at a press conference in Paris earlier last month.. Asgardia is the prototype of a free society in space. It aims to launch its first satellite in 2017 and be recognized by the UN. more»

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail We recently discussed governmental organizations that send out warnings rather than preventing spear phishing attacks through email authentication. Therefore it's good to see a pair of prominent governmental organizations giving clear guidance to their constituents about using DMARC to enforce authenticity of email on their domains. The British Government Digital Service announced in June an upcoming requirement that all services using subdomains of gov.uk would need to have a DMARC policy at enforcement. more»

Afilias Chairman Jonathan Robinson Wins ICANN's 2016 Leadership Award at ICANN 57

Afilias Afilias, a leading domain registry operator, congratulates Jonathan Robinson, Executive Chairman of Afilias' Board of Directors, on receiving the Internet Corporation for Assigned Names and Numbers (ICANN) 2016 Leadership Award for his contributions to the ICANN and broader internet community. more»

ValiMail Raises $12M for Its Email Authentication Service

ValiMail The company will use the funds to meet the rapidly expanding demand for its patent-pending authentication platform which brings visibility, control, compliance, and security to cloud-based email services. more»

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

MarkMonitor In the capacity that MarkMonitor has as an ICANN accredited registrar, we have observed numerous issues with registrations in the .feedback registry. These issues date back to the initial launch of .feedback earlier this year. more»

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Mark Partridge
Managing Partner at Partridge IP LawJoined on Aug 12, 2004

Suresh Ramasubramanian
Antispam OperationsJoined on Jun 21, 2004

Darren W. Miller
Information & Network Security SpecialistJoined on May 03, 2005

Alexa Raad
CEO of ArchitelosJoined on Jun 22, 2006

Wil Tan
CTO, Cloud Registry -- innovative TLD registry back-end providerJoined on Oct 25, 2006

Ryan Baker
Advisor, Professional Services at Neustar Inc.Joined on May 07, 2014

John Matson
Co-Founder and COO of ArchitelosJoined on Jul 11, 2011

Duane Wessels
Principal Research Scientist at VerisignJoined on Jul 16, 2008

Nick Ashton-Hart
Associate Fellow, Geneva Centre for Security PolicyJoined on Nov 08, 2013

Fergie
Director of Threat IntelligenceJoined on May 09, 2005

Brad Templeton
Electronic Frontier Foundation (EFF) Boardmember, Entrepreneur and TechnologistJoined on Sep 16, 2003

Peter HJ van Eijk
Cloud Computing Coach, Author and SpeakerJoined on Aug 18, 2006

Xudong Zhang
Vice PresidentJoined on Aug 06, 2015

Torbjörn Eklöv
CTO, Senior Network Architect, DNSSEC/IPv6Joined on Jan 27, 2010

Elliot Noss
President and CEO of Tucows Inc.Joined on Jul 20, 2003

John Horton
President of LegitScriptJoined on May 13, 2010

Michael Young
Chief Technology Officer at ArchitelosJoined on Mar 09, 2011

Teresa Chen
Joined on Jul 22, 2010

Andrew Sullivan
Director of Labs at DynJoined on Mar 27, 2012

Jeff Neuman
Senior Vice President, Valideus USAJoined on Oct 02, 2007

Steve DelBianco
Executive Director at NetChoiceJoined on Jan 11, 2009

Javier Rodriguez
Joined on Mar 09, 2013

Jovan Kurbalija
Director of DiploFoundation & Head of Geneva Internet PlatformJoined on Apr 19, 2004

Adrian Kinderis
Vice President Corporate Development at NeustarJoined on Nov 23, 2009

Gordon Cook
Joined on Sep 10, 2007

Christa Taylor
Christa Taylor is the CEO of DotTBAJoined on Nov 30, 2012

Jay Daley
Chief Executive of the .nz registryJoined on Mar 15, 2004

Tobias Flaitz
Chief Executive Officer at Sedo Holding AGJoined on Oct 05, 2011

Dave Crocker
ConsultantJoined on Oct 27, 2004

Joshua Braunstein
General Manager, CT CorsearchJoined on Feb 04, 2010