Hot Topics:   Security    Cyberattack    Domain Names    Policy & Regulation    Top-Level Domains    Law    Access Providers    more...

Featured Blogs

How Did We Get Here? A Look Back at the History of IANA

Geoff Huston October 2016 marks a milestone in the story of the Internet. At the start of the month, the United States Government let its residual oversight arrangements with ICANN over the operation of the IANA lapse. No single government now has a unique relationship with the governance of the protocol elements of the Internet, and it is now in the hands of a community of interested parties in a so-called Multi-Stakeholder framework. This is a unique step for the Internet and not without its attendant risks. How did we get here? more»

Understanding 'Reverse Domain Name Hijacking' Under the UDRP

Doug Isenberg "Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more»

Building a Base of Knowledge for Advocacy Abroad in the Digital Age

Daniel A. Sepulveda Answering questions at the Internet Association's Virtuous Circle conference last week, Secretary Kerry presented the U.S. Department of State's effort to prioritize global digital economy issues abroad in order to reflect the growing importance of these issues in both economic and foreign policy. The State Department has made real progress on this initiative in the last year and hopes to continue our momentum going forward. more»

The Importance of Protecting Credibility: Claiming and Rebutting Cybersquatting

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) is an online dispute resolution regime. While panelists technically have discretion under Rule 13 to hold in-person hearings if they "determine[ ] ... and as an exceptional matter, that such a hearing is necessary for deciding the complaint" no in-person hearing has ever been held. Rule 13 exists to be ignored. more»

China Shows Positive Attitude Towards IANA Transition

Jian Chuan Zhang Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more»

Another Free Registry Software Option

Roland LaPlante Google has recently announced the release of Nomulus, its free, open source registry software, triggering discussion of its impact on the industry. Afilias has over 15 years of experience in registry operations, and offers the following initial thoughts... First, free registry software is not new.CoCCA has offered this option for years, and TLDs such as .CX (Christmas Island) and .KI (Kiribati) use it. It is supported on a "best efforts" basis and appears to meet the limited needs of a few small operators. more»

Using Dot Brand Domains in Brand Communication

Guillaume Pahud A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more»

Web Localization: Sometimes as Simple as a Black and White

John Yunker The death of Thailand's King Bhumibol Adulyadej has led to stores running out of black and white clothing as the population mourns its leader in color-appropriate clothing. What does this mean for website localization? ...Web localization isn't just about creating a localized website and forgetting about it. It's about creating a living and breathing website that responds quickly to local events. Web localization is about respect. more»

Africa, Let's Embrace v6 Now!

 Vymala Thuron AFRINIC is the regional Internet registry for Africa, and our core activity is to manage and distribute Internet numbers resources (IPv4, IPv6 and ASN's) to the 57 economies in Africa. IPv4 address scarcity is a very real issue worldwide, the internet keeps growing and the demand for Internet addresses will continue to grow. Africa has the lowest number of Internet users in the world. Internet's penetration in Africa jumped from very low level in 2009, to around 16% of individuals in 2013 and over 20% in 2015. more»

The Future of Software Patents

Russ White What should we do with software patents? I've seen both sides of the debate, as I work a great deal in the context of standards bodies (particularly the IETF), where software patents have impeded progress on a community-driven (and/or community-usable) standard. On the other hand, I have been listed as a co-inventor on at least 40 software patents across more than twenty years of work, and have a number of software patents either filed or in the process of being filed. more»

A Great Collaborative Effort: Increasing the Strength of the Zone Signing Key for the Root Zone

Duane Wessels A few weeks ago, on Oct. 1, 2016, Verisign successfully doubled the size of the cryptographic key that generates DNSSEC signatures for the internet's root zone. With this change, root zone DNS responses can be fully validated using 2048-bit RSA keys. This project involved work by numerous people within Verisign, as well as collaborations with ICANN, Internet Assigned Numbers Authority (IANA) and National Telecommunications and Information Administration (NTIA). more»

.US Hosts its Annual Town Hall Meeting

Becky Burr Neustar, a leading provider of registry services, is hosting a Town Hall meeting this month for the United States' country code Top-Level Domain, .US. Neustar introduced the .US Town Hall last year to reflect our commitment -- and the Commerce Department commitment to the bottom-up, multistakeholder model of DNS management. The public forum is an important part of ensuring that .US continues to be a vibrant namespace that reflects America's diversity, creativity, and innovative spirit. more»

Supplementing the Record in UDRP Proceedings; When Acceptable?

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more»

When 'Confusing Similarity' in UDRP Cases Gets Confusing

Doug Isenberg The first element of the Uniform Domain Name Dispute Resolution Policy (UDRP) requires a complainant to prove that the disputed domain name "is identical or confusingly similar to a trademark or service mark in which the complainant has rights." It's unusual for a complainant to fail on this first of three prongs, but one recent case demonstrates just how uncertain the UDRP can be sometimes. more»

War-Torn Syrian City Aleppo Gets New Fiber Link

Doug Madory The northern Syrian city of Aleppo is one of the key battlegrounds of that country's on-going civil war as well as the epicenter of the European refugee crisis. The most appropriate United States response to events in Aleppo has become a major foreign policy question among the candidates in this year's U.S. presidential election. Experts are now predicting that forces loyal to President Bashar al-Assad, backed by the Russian military, will take control of rebel-held eastern Aleppo within weeks. more»

News Briefs

Substantial DDoS Attack Disrupts Twitter, Netflix, Visa and other Major Sites

Major internet sites were disrupted for several hours this morning as internet infrastructure provider Dyn reported it was under a cyberattack, mainly affecting traffic on the U.S. East Coast. ›››

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. ›››

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules

The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. ›››

US Banks Face New Demands by Regulators for Higher Cyber Risk Management Standards

U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms," Patrick Rucker reporting in Reuters. ›››

FBI, Czech Police Arrest Russian in Connection With US Hacking Attacks

FBI in a joint operation with the Czech police, arrested a Russian citizen in Prague on Wednesday in connection with attempted cyber-attacks against the United States. ›››

Syria's Undersea Cable Repairs Will Take Down 60% of Nation's Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. ›››

Google Announces Nomulus, Open Source Top-Level Domain Name Registry

Google today announced the release of Nomulus, a new open source cloud-based registry platform that runs Google's top level domains (TLDs) and now available to everyone. ›››

DNC Emails Hacked Using Fake Gmail Login Forms

A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. ›››

WikiLeaks: Ecuador Has Cut Off Assange's Internet Access

WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. ›››

Montenegro Election Day Disrupted by Several Cyberattacks

The Ministry for Information Society and Telecommunications of Montenegro has confirmed several key websites were targeted by cyberattacks on Sunday (16 October), the day of the country's parliamentary elections. ›››

UK Security Agencies Have Unlawfully Collected Data for 17 Years, Says Court

"British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, top judges have ruled," according to a report published today in The Guardian. ›››

Lawsuit Against IANA Transition Dropped

Four US states attorneys general have quietly thrown in the towel in their attempt to have the IANA transition blocked," reports Kevin Murphy this morning in Domain Incite. ›››

Putin Shrugs Off US Retaliation Threat Over Alleged DNC Hack

"Vladimir Putin on Sunday shrugged off new US threats to retaliate against alleged Russian hackers, saying such statements only confirmed that Washington used cyber-attacks for political ends," Reuters reports. ›››

Notorious Russian Ship Yanter Suspected of Cutting Syria's Undersea Internet Cables

A Russian ship, suspected by intelligence and military officials to be capable of cutting undersea Internet cables, is spotted near the coast of Syria. ›››

British Banks Not Fully Reporting Cyber Attacks, Fear Punishment, Bad Publicity

"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. ›››

Google and Facebook Join Forces to Directly Connect Los Angeles to Hong Kong via Undersea Cable

TE SubCom, leading provider of undersea communications technology and marine services, along with Facebook, Google, and PLDC (Pacific Light Data Communication Co. Ltd.), have announced that they will co-build the Pacific Light Cable Network (PLCN), a 12,800 km transpacific submarine cable system that will provide the first direct undersea route between Hong Kong and Los Angeles, California (USA) with ultra-high capacity transmission. ›››

.COM Registrations Continue to Rise, Unphased by New gTLDs, ICANN Study Reveals

A recent study commissioned by ICANN reveals despite introduction and growth of new gTLDs, .COM and other legacy TLDs have remained steady and rising. ›››

US to Retaliate Russian DNC Hack, Will Hit Russia with "Proportional" Response

The White House on Tuesday vowed a 'proportional' response for Russian DNC Hack -- Intelligence officials say files were leaked to interfere with outcome of presidential election. ›››

New Trojan Used in High Level Financial Attacks, Multiple Banks Attacked

Since January 2016, discreet campaigns involving malware called Trojan.Odinaff have targeted a number of financial organizations worldwide, warned Symantec Security Response team on Tuesday. ›››

G7 Nations Set Cybersecurity Guidelines for Financial Sector

The Group of Seven industrial powers today announced an agreement on guidelines aimed at protecting global financial sector from cyberattacks amidst a series of cross-border bank thefts by hackers. Jason Lange from Washington reporting in Reuters. ›››

Popular News – Last 30 Days

Recent Comments

Sponsored Topics



Sponsored by


Sponsored by

DNS Security

Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services

Industry Updates

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

8 Tips to Find Your Perfect .COM Domain Name

Verisign With nearly 30 years of top-tier news, entertainment and businesses associated with .com, it has become one of the most versatile, trusted and recognizable domain name extensions around the world. more»

Why .com is the Venture Capital Community's Power Player

Verisign The Venture Capital (VC) community is well aware of the value of a great domain name. Recent data shows that .com is the most popular domain extension for funded startups. more»

Defending Against Layer 7 DDoS Attacks

Verisign Layer 7 attacks are some of the most difficult attacks to mitigate because they mimic normal user behavior and are harder to identify. Verisign's recent trends show that DDoS attacks are becoming more sophisticated and complex, including an increase in application layer attacks. more»

Understanding the Risks of the Dark Web

MarkMonitor At least 60% of brands will discover a breach of sensitive data. However, many organizations simply don't know what they don't know. Researchers at MIT discovered that a full 75 percent of breaches go undiscovered for weeks or months and 67 percent of breaches were aided by significant errors from employees of the victimized firm. more»

The .cancerresearch TLD: Search for Cure Drives Digital Innovation

Neustar Coinciding with the launch of the International Centre for the Proteome of Human Cancer (ProCan™), the Australian Cancer Research Foundation (ACRF) has added to its growing network of sites on the .cancerresearch TLD. more»

New TLD? Make Sure It's Secure

Neustar The introduction of hundreds of new Top-Level Domains (TLDs) is an exciting time for consumers, businesses, and the Internet community as a whole. However, malicious actors seeking new channels to pursue their activities are also rubbing their hands together with the launch of these TLDs. more»

Radix Launches Startup League at TechCrunch

Radix The Startup League is a unique startup-support program designed to aid early stage startups that use any of Radix's TLDs to launch their idea or company. This initiative will support startups across several key areas like marketing, event sponsorships, and PR. more»

Celebrating One Year of .online

Radix Last year this time, one of the most awaited new gTLDs, .ONLINE entered general availability followed by a successful launch. With 10,000 registrations in the first 10 minutes and 38,000 in the first 24 hours, it was one of the most sought after extensions by customers globally. more»

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Verisign today released its Q2 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services, and research conducted by Verisign iDefense Security Intelligence Services. more»

LogicBoxes Launches the New Elite Reseller Program

LogicBoxes LogicBoxes, the leading provider of web presence automation solutions for Web Hosts, Domain Resellers and ICANN Registrars, today announced the launch of its new Elite Reseller Program. This program lays a strategic focus on fast-growing Web Hosting Providers. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Mwendwa Kivuva
Project Manager at AFRINICJoined on Feb 12, 2014

Dan York
Author and Speaker on Internet technologies - and on staff of Internet SocietyJoined on Apr 24, 2007

Gregory Francis
Managing Director at Access PartnershipJoined on Sep 17, 2010

Dave Crocker
ConsultantJoined on Oct 27, 2004

Kathy Brown
President and CEO, Internet SocietyJoined on Oct 20, 2015

Robert Cannon
CybertelecomJoined on Aug 08, 2007

Constance Bommelaer
Senior Director, Global Internet Policy, Internet SocietyJoined on Mar 23, 2015

St├ęphane Van Gelder
StartingDot, MILATHANJoined on Aug 27, 2008

Andrew Sullivan
Director of Labs at DynJoined on Mar 27, 2012

Tina Dam
Co-Founder MYTLDJoined on Oct 05, 2007

Kieren McCarthy
Executive Director at IFFOR; CEO at .NxtJoined on Jul 09, 2006

Veni Markovski
Joined on Sep 07, 2005

Burt Kaliski
Chief Technology Officer at VerisignJoined on Jun 06, 2012

Kim Davies
Manager, Root Zone ServicesJoined on Feb 23, 2005

Leslie Daigle
Principal, ThinkingCat Enterprises and Editor, InternetImpossibleJoined on May 16, 2013

Paul Wilson
Director General of APNICJoined on Nov 13, 2003

Jon Arnold
Principal, J Arnold & AssociatesJoined on Apr 24, 2007

Karen Rose
Senior Director, Office of Strategy and Research, Internet SocietyJoined on Apr 27, 2015

Bill Smith
Sr. Policy Advisor, Technology Evangelist at PayPalJoined on Aug 23, 2011

Terry Zink
Program ManagerJoined on Aug 20, 2007

Geoff Huston
Author & Chief Scientist at APNICJoined on Sep 06, 2003

Laura Atkins
Founding partner of anti-spam consultancy & software firm Word to the WiseJoined on Nov 12, 2009

Adrian Kinderis
Vice President Corporate Development at NeustarJoined on Nov 23, 2009

Jean Guillon
New generic Top-Level Domains' specialistJoined on Aug 29, 2008

Kiran Malancharuvil
Internet Policy Counselor at MarkMonitorJoined on Sep 25, 2013

Brad Templeton
Electronic Frontier Foundation (EFF) Boardmember, Entrepreneur and TechnologistJoined on Sep 16, 2003

Richard Bennett
Senior Research FellowJoined on Oct 23, 2007

Alec Saunders
Vice President, Developer Relations, BlackBerry Joined on Apr 24, 2007

Jeannie McPherson
Senior Manager of Corporate Communications, VerisignJoined on Dec 12, 2014

Ian Peter
Joined on Dec 30, 2003