Featured Blogs

Latest

Spotlight on TD-LTE Technology and Spectrum

As handheld devices grow ever more sophisticated and demand for content-rich services such as mobile video increases, mobile data traffic is likely to continue growing at an explosive rate. This represents good news for the industry, but next-generation wireless technologies will need to be ready to meet the challenge and able to cope with these increased demands on bandwidth. A recent TD-LTE spectrum workshop looked at the potential of TD-LTE technology to take us on to the next stage of wireless communication. more

What Chinese DDoS Malware Looks Like

While at that same Virus Bulletin conference that I was talking about earlier in my other post, I also had the chance to check out a session on Chinese DDoS malware put on by some folks from Arbor Networks. As little insight as I have into Android malware, I know even less about Chinese DDoS malware. So what's Chinese DDoS malware like? What are its characteristics? more

Taking the Leap to Cloud-Based Malware Inspection

Is desktop anti-virus dead? Someday I'd love to make that announcement, but it still feels to me that there's a Patron Saint of Voodoo with an affinity for bringing it back to life -- like some macabre mirror image of the malicious zombies it's supposed to provide protection against. It's kind of ironic that today's innovation in desktop anti-virus isn't really happening at the desktop; rather it's occurring in the cloud. more

European Commission in Favour of New IANA Contract - Disapproves of US Only Bidding Process

In a move that shouldn't come as a surprise to anyone, the EU Commission has given a rather mixed welcome to the IANA bid. While they obviously like a lot of what they are seeing, they're also not overly impressed with the contract only being open to US companies. more

What Mobile Malware Looks Like

Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What's mobile malware like? What are the threats? How do users get infected? more

New TLD Spotted - .FUD

In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more

Will Google Search Replace Domain Names?

The growing notion among big advertising agencies and brand marketers is that as search engines find answers instantly, there's no real need to enter a domain name in the browser and therefore domain names are far less important. They're absolutely right. Why would you type www.rolex.com when you can simply enter 'Rolex' and be there before you blink? But where they are seriously wrong is when you enter anything like 'Interlink', 'Pronet', 'National Trust', 'Premier Traders' or 'United Manufacturing', uncontrollable citations will gush out from every corners of the world. more

Biggest Botnet Takedown to Date

Yesterday law enforcement officials arrested 6 people and charged them with running a massive internet fraud ring. Over 4 million PCs were part of the botnet. According to the FBI, "the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA." more

Evaluating the Growth of Internet Traffic

At the opening of NANOG 53, Kevin McElearney of Comcast commented that within Comcast Regional Area Networks (CRANs), the company is regularly pushing 40+ Gbps of traffic out to the global Internet. This is a massive amount of traffic and in many cases, it's more traffic than entire countries around the world push out to the Internet. It got me thinking about just how much traffic there is on the Internet and the rate at which that traffic will grow over the coming years. more

IPv6 RIPEness: More Smaller and Younger Organizations Deploying IPv6

The number of RIPE NCC members [also referred to as Local Internet Registries (LIRs)] that have an IPv6 allocation continues to grow -- in absolute terms as well as in percentages. 46% of all RIPE NCC members have one or more IPv6 RIPEness stars. ... Do new members pick up IPv6? Are older members with more experience, well-established businesses and customer base dominating IPv6 RIPEness scores? And what about the size of a member? Are small and large members adopting IPv6 in equal proportions? In this article we look into answering these questions. more

The Impressive Growth in Global Internet Stats (2011)

The ITU launched its latest statistics report, the World in 2011: ICT Facts and figures, which revealed impressive growth in a number of areas such as global internet use, particularly in developing countries. The report included further key details such as: "One third of the world's population are forecast to be online by the end of 2011..." more

IPv4 Historical Imbalances and the Threat to IPv6

It is an open secret that the current state of IPv4 allocation contains many accidental historical imbalances and in particular developing countries who wish to use IPv4 are disadvantaged by the lack of addresses available through ordinary allocation and are forced into purchasing addresses on the open market. As most of the addresses for sale are held by organisations based in the developed world, this amounts to a transfer of wealth from the developing world to the developed world, on terms set by the developed world. more

ICANN: The Stakes in Registrar Accreditation

Law enforcement demands to domain name registrars were a recurring theme of the 42d ICANN public meeting, concluded last week in Dakar. The Governmental Advisory Committee (GAC) took every opportunity at its public meetings with GNSO and Board, and in its Communique to express dismay, disappointment, and demands for urgent action to "reduce the risk of criminal abuse of the domain name system." more

Professional Services Are a Safe Bet to Address Staff Shortages

Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more

RIPE Members Vote To Continue RPKI Work

RIPE 63 is on this week in Vienna, Austria. Yesterday evening saw the General Meeting where members were asked to vote on a number of motions. While some of the motions were more formalities than anything else, the votes on RPKI and the membership fee structure for 2012 provoked some emotive debate. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days