Hot Topics:   Security    Cyberattack    Policy & Regulation    Domain Names    Access Providers    DDoS    Top-Level Domains    more...

Featured Blogs

Intentional Disruptions to Internet Access Cost Countries $2.4 Billion Last Year

Darrell M. West Around the world, digital technology is seen as vital for economic development. In the U.S. alone, the Internet accounts for about six percent of the entire economy. Digital technology has expanded its role in the global economy in recent years, as both developed and developing nations have become increasingly reliant on the Internet. more»

8 Facts About 3-Member Panels in UDRP Cases

Doug Isenberg Proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP) can be heard by either a one- or three-member panel. Here are eight important facts that every complainant (trademark owner) and respondent (domain name registrant) should consider when deciding whether to select one or three members... Either party - complainant or respondent - has an opportunity to select a three-member panel... more»

Taking a Closer Look at the Recent DDoS Attacks and What it Means for the DNS

Geoff Huston The recent attacks on the DNS infrastructure operated by Dyn in October 2016 have generated a lot of comment in recent days. Indeed, it's not often that the DNS itself has been prominent in the mainstream of news commentary, and in some ways, this DNS DDOS prominence is for all the wrong reasons! I'd like to speculate a bit on what this attack means for the DNS and what we could do to mitigate the recurrence of such attacks. more»

Selling DONA Snake Oil at the ITU

Anthony Rutkowski A venerable old ITU tradition got underway today. Its Telecommunication Standardization body, known as the ITU-T, gathered, as it has done every four years for much of the past 100 years in a conclave of nations, to contemplate what they should be doing at their Geneva intergovernmental standards meetings for the next four years. The gathering is called the WTSA... Old intergovernmental institutional habits still continue, so the participants are gathered in a remote location in Tunisia called Hammamet. more»

Trust Isn't Easy: Drawing an Agenda from Friday's DDoS Attack and the Internet of Things

Olaf Kolkman Last week, millions of infected devices directed Internet traffic to DNS service provider Dyn, resulting in a Distributed Denial of Service (DDoS) attack that took down major websites including Twitter, Amazon, Netflix, and more. In a recent blog post, security expert Bruce Schneier argued that "someone has been probing the defences of the companies that run critical pieces of the Internet". This attack seems to be part of that trend. This disruption begs the question: Can we trust the Internet? more»

Security as a Major Factor for Online Consumers

Nate Vickery There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more»

The Massive Cyberattack or Chronicle of a Strike Foretold

Fernando Barrio During the last Computer Law Conference organized by ADIAR (Argentina Computer Law Association) and the Universidad Nacional de Sur, I gave a conference on the Internet of Things, cybercrime and dangerous situation presented by the lack of proper regulation -- a topic in which I have one of my research projects. At the moment some people argued that I was talking about something that might happen in a relatively distant future, dissenting with my view that the possibility was imminent.. more»

The Internet Needs a Security and Performance Upgrade

Martin Geddes Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more»

How Did We Get Here? A Look Back at the History of IANA

Geoff Huston October 2016 marks a milestone in the story of the Internet. At the start of the month, the United States Government let its residual oversight arrangements with ICANN over the operation of the IANA lapse. No single government now has a unique relationship with the governance of the protocol elements of the Internet, and it is now in the hands of a community of interested parties in a so-called Multi-Stakeholder framework. This is a unique step for the Internet and not without its attendant risks. How did we get here? more»

Understanding 'Reverse Domain Name Hijacking' Under the UDRP

Doug Isenberg "Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more»

Building a Base of Knowledge for Advocacy Abroad in the Digital Age

Daniel A. Sepulveda Answering questions at the Internet Association's Virtuous Circle conference last week, Secretary Kerry presented the U.S. Department of State's effort to prioritize global digital economy issues abroad in order to reflect the growing importance of these issues in both economic and foreign policy. The State Department has made real progress on this initiative in the last year and hopes to continue our momentum going forward. more»

The Importance of Protecting Credibility: Claiming and Rebutting Cybersquatting

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) is an online dispute resolution regime. While panelists technically have discretion under Rule 13 to hold in-person hearings if they "determine[ ] ... and as an exceptional matter, that such a hearing is necessary for deciding the complaint" no in-person hearing has ever been held. Rule 13 exists to be ignored. more»

China Shows Positive Attitude Towards IANA Transition

Jian Chuan Zhang Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more»

Another Free Registry Software Option

Roland LaPlante Google has recently announced the release of Nomulus, its free, open source registry software, triggering discussion of its impact on the industry. Afilias has over 15 years of experience in registry operations, and offers the following initial thoughts... First, free registry software is not new.CoCCA has offered this option for years, and TLDs such as .CX (Christmas Island) and .KI (Kiribati) use it. It is supported on a "best efforts" basis and appears to meet the limited needs of a few small operators. more»

Using Dot Brand Domains in Brand Communication

Guillaume Pahud A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more»

News Briefs

FCC Approves New Privacy Rules Restricting Data Collection by Broadband Providers

The U.S. Federal Communications Commission today voted 3-2 to approve rules requiring broadband Internet Service Providers to provide customers more control over the use of their personal information. ›››

Google Fiber Pauses Operations Until Further Notice

Access, the Alphabet internet division containing Google Fiber, is laying off about nine percent of its staff and "pausing" fiber operations while looking for alternate ways to deliver internet service to new cities. ›››

No Apparent Financial or Political Motivation Behind Dyn DDoS Attacks, Says Intelligence Firm

In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with "a moderate degree of confidence" that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors. ›››

U.S. Senator Inquiring Into Friday's Crippling Cyberattack

U.S. Sen. Mark R. Warner (D-VA), a member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, has released a letter asking three federal agencies for information on the tools available that prevent cyber criminals from compromising consumer products, such as Internet of Things (IoT) devices. ›››

Amnesty International: Popular Mobile Apps Failing to Adopt Basic Privacy Protections

"Tech companies like Snapchat and Skype's owner Microsoft are failing to adopt basic privacy protections on their instant messaging services, putting users' human rights at risk," says Amnesty International. ›››

U.S. Federal Government Response Too Slow to Friday's Internet Attack, Warns Cybersecurity Official

"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. ›››

U.S. Department of Transportation Issues Federal Cybersecurity Guidance to Automotive Industry

U.S. Department of Transportation issues Federal guidance to the automotive industry for improving motor vehicle cybersecurity. The guidance covers cybersecurity best practices for all motor vehicles, individuals and organizations manufacturing and designing vehicle systems and software. ›››

Substantial DDoS Attack Disrupts Twitter, Netflix, Visa and other Major Sites

Major internet sites were disrupted for several hours this morning as internet infrastructure provider Dyn reported it was under a cyberattack, mainly affecting traffic on the U.S. East Coast. ›››

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. ›››

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules

The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. ›››

US Banks Face New Demands by Regulators for Higher Cyber Risk Management Standards

U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms," Patrick Rucker reporting in Reuters. ›››

FBI, Czech Police Arrest Russian in Connection With US Hacking Attacks

FBI in a joint operation with the Czech police, arrested a Russian citizen in Prague on Wednesday in connection with attempted cyber-attacks against the United States. ›››

Syria's Undersea Cable Repairs Will Take Down 60% of Nation's Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. ›››

Google Announces Nomulus, Open Source Top-Level Domain Name Registry

Google today announced the release of Nomulus, a new open source cloud-based registry platform that runs Google's top level domains (TLDs) and now available to everyone. ›››

DNC Emails Hacked Using Fake Gmail Login Forms

A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. ›››

WikiLeaks: Ecuador Has Cut Off Assange's Internet Access

WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. ›››

Montenegro Election Day Disrupted by Several Cyberattacks

The Ministry for Information Society and Telecommunications of Montenegro has confirmed several key websites were targeted by cyberattacks on Sunday (16 October), the day of the country's parliamentary elections. ›››

UK Security Agencies Have Unlawfully Collected Data for 17 Years, Says Court

"British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, top judges have ruled," according to a report published today in The Guardian. ›››

Lawsuit Against IANA Transition Dropped

Four US states attorneys general have quietly thrown in the towel in their attempt to have the IANA transition blocked," reports Kevin Murphy this morning in Domain Incite. ›››

Putin Shrugs Off US Retaliation Threat Over Alleged DNC Hack

"Vladimir Putin on Sunday shrugged off new US threats to retaliate against alleged Russian hackers, saying such statements only confirmed that Washington used cyber-attacks for political ends," Reuters reports. ›››

Popular News – Last 30 Days

Recent Comments

Sponsored Topics



Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services

DNS Security

Sponsored by


Sponsored by

Industry Updates

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

MarkMonitor In the capacity that MarkMonitor has as an ICANN accredited registrar, we have observed numerous issues with registrations in the .feedback registry. These issues date back to the initial launch of .feedback earlier this year. more»

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

8 Tips to Find Your Perfect .COM Domain Name

Verisign With nearly 30 years of top-tier news, entertainment and businesses associated with .com, it has become one of the most versatile, trusted and recognizable domain name extensions around the world. more»

Why .com is the Venture Capital Community's Power Player

Verisign The Venture Capital (VC) community is well aware of the value of a great domain name. Recent data shows that .com is the most popular domain extension for funded startups. more»

Defending Against Layer 7 DDoS Attacks

Verisign Layer 7 attacks are some of the most difficult attacks to mitigate because they mimic normal user behavior and are harder to identify. Verisign's recent trends show that DDoS attacks are becoming more sophisticated and complex, including an increase in application layer attacks. more»

Understanding the Risks of the Dark Web

MarkMonitor At least 60% of brands will discover a breach of sensitive data. However, many organizations simply don't know what they don't know. Researchers at MIT discovered that a full 75 percent of breaches go undiscovered for weeks or months and 67 percent of breaches were aided by significant errors from employees of the victimized firm. more»

The .cancerresearch TLD: Search for Cure Drives Digital Innovation

Neustar Coinciding with the launch of the International Centre for the Proteome of Human Cancer (ProCan™), the Australian Cancer Research Foundation (ACRF) has added to its growing network of sites on the .cancerresearch TLD. more»

New TLD? Make Sure It's Secure

Neustar The introduction of hundreds of new Top-Level Domains (TLDs) is an exciting time for consumers, businesses, and the Internet community as a whole. However, malicious actors seeking new channels to pursue their activities are also rubbing their hands together with the launch of these TLDs. more»

Radix Launches Startup League at TechCrunch

Radix The Startup League is a unique startup-support program designed to aid early stage startups that use any of Radix's TLDs to launch their idea or company. This initiative will support startups across several key areas like marketing, event sponsorships, and PR. more»

Celebrating One Year of .online

Radix Last year this time, one of the most awaited new gTLDs, .ONLINE entered general availability followed by a successful launch. With 10,000 registrations in the first 10 minutes and 38,000 in the first 24 hours, it was one of the most sought after extensions by customers globally. more»

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Verisign today released its Q2 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services, and research conducted by Verisign iDefense Security Intelligence Services. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Evan Daniels
Joined on Apr 11, 2013

Irwin Lazar
AnalystJoined on Apr 24, 2007

John Grady
Senior Manager of Product MarketingJoined on Feb 24, 2014

Eric Brunner-Williams
MathematicianJoined on Jan 22, 2005

Wout de Natris
Consultant international cooperation cyber crime + trainer spam enforcementJoined on Nov 08, 2010

Benjamin Edelman
Assistant Professor, Harvard Business SchoolJoined on Jun 14, 2003

Constantine Roussos
Founder of DotMusicJoined on Aug 22, 2009

Fred Tabsharani
VP of Marketing at Port25Joined on Mar 03, 2016

Kurt Pritz
Director of Strategic Planning and Policy at AllegravitaJoined on May 15, 2014

Susan Crawford
Professor, Cardozo Law School in New York CityJoined on Nov 19, 2003

Philippe Rodhain
Intellectual Property LawyerJoined on Jun 14, 2003

Lee S Dryburgh
Founder of eComm Media, IncJoined on Feb 12, 2008

Chris Wright
Chief Technology Officer at ARI Registry ServicesJoined on Jul 11, 2010

Chris Linfoot
IT Director @ LDV Group LimitedJoined on Jul 20, 2004

Udeme Ukutt
Joined on Oct 15, 2010

David P. Reed
Joined on May 14, 2008

Steve Stolfi
VP of Global Partnerships at CT CorsearchJoined on Aug 09, 2010

Steve Jones
Consultant - Programmer - StrategistJoined on May 23, 2014

Tina Dam
Co-Founder MYTLDJoined on Oct 05, 2007

Tobias Flaitz
Chief Executive Officer at Sedo Holding AGJoined on Oct 05, 2011

Guillaume Pahud
CEOJoined on Jan 18, 2016

Samantha Frida
Data GeekJoined on Aug 11, 2003

Phillip Hallam-Baker
Consultant, Author, SpeakerJoined on May 22, 2010

Nigel Roberts
CEO at CHANNELISLES.NETJoined on Mar 04, 2006

Ewan Sutherland
Telecommunications Policy AnalystJoined on Jan 01, 2006

Ram Mohan
Executive Vice President & CTO, AfiliasJoined on Aug 05, 2004

Chris Buijs
Head of DeliveryJoined on Dec 21, 2011

Doug Isenberg
Attorney & Founder of The GigaLaw FirmJoined on Feb 08, 2016

Vint Cerf
Vice President & Chief Internet Evangelist, Google Inc.Joined on Nov 04, 2004

Karl Auerbach
Chief Technical Officer at InterWorking LabsJoined on Jun 14, 2003