Hot Topics:   Security    Policy & Regulation    Top-Level Domains    Internet Governance    Domain Names    Access Providers    Cyberattack    more...

Featured Blogs

AfPIF Brings Together Internet Players

Mwendwa Kivuva If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world. more»

Does Apple's Cloud Key Vault Answer the Key Escrow Question?

Steven Bellovin In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krstić) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more»

Internet Access: A Chokepoint for Development

Said Zazai In the 1980's internet connectivity meant allowing general public to communicate and share knowledge and expertise with each other instantly and where it was not possible otherwise. Take the story of Anatoly Klyosov, connecting Russia to the western world for the first time in 1982, as an example. A bio-chemist who was not allowed to leave the soviet territory for security reasons. The internet enabled him to participate in meetings with his counterparts at Harvard University, University of Stockholm and beyond. more»

Challenging UDRP Awards in Courts of Competent Jurisdiction

Gerald M. Levine The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive forum for the resolution of domain names accused of cybersquatting even though registration agreements use the word "mandatory" in the event of third-party claims. The UDRP is mandatory only in the sense that respondents are "obliged by virtue of the [registration] agreement to recognize the validity of a proceeding initiated by a third-party claimant." more»

Examining IPv6 Performance - Revisited

Geoff Huston Every so often I hear the claim that some service or other has deliberately chosen not to support IPv6, and the reason cited is not because of some technical issue, or some cost or business issue, but simply because the service operator is of the view that IPv6 offers an inferior level service as compared to IPv4, and by offering the service over IPv6 they would be exposing their clients to an inferior level of performance of the service. more»

China's QUESS and Quantum Communications

Paul Budde In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more»

Security Against Election Hacking - Part 2: Cyberoffense Is Not the Best Cyberdefense!

Andrew Appel State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more»

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

Doug Isenberg In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more»

Security Against Election Hacking - Part 1: Software Independence

Andrew Appel There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more»

Video: Interview with Jari Arkko at IETF 96 in Berlin

Dan York Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more»

ICANN the Machine…

Shaul Jolles ICANN's new gTLD expansion is really quite an ingenious ploy to grow the once small California non-profit into an unstoppable machine, worth hundreds of millions of dollars, which soon plans to finally be free from any external oversight. I have no doubt that ICANN pats itself on the back for pulling the wool over so many eyes, including stakeholders, new gTLD applicants, politicians, and the global general public. more»

Reselling Domain Names on the Secondary Market: Bona Fide Offering, or Not?

Gerald M. Levine On the question of reselling domain names on the secondary market, a dissenting panelist in a 2005 case observed that "[t]here is no doubt Respondent is in the business of being a reseller of domain names that consist of common English words" and then suggested that the "fundamental question before the Panel is whether or not such a business should be allowed under the UDRP." He concluded that such a business should not be allowed... more»

Buying Multiple Domains Makes Sense

Jean Guillon Companies usually use one single domain name for their online activities but then, more questions pop up: SEO, Infringement, Future of the company, monitoring online competition... If buying multiple domain names answers some of these questions, there is a way to do it. Here is how... It often happens that the domain name of a company is neither the generic keyword of its core business nor a keyword that necessarily appears attached to its name. more»

Complexity and Crashes

Russ White It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem. more»

A Journey Into the Surreal: The GOP Protecting "Internet Freedom" With 25 Friends

Anthony Rutkowski Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more»

News Briefs

Italy's Earthquake Rescuers Ask Locals to Unlock Their Wi-fi to Assit in Search and Rescue

The Italian Red Cross says residents' home networks can assist with communications during the search for survivors following Wednesday's 6.2 magnitude earthquake which struck central Italy killing over 240 people. ›››

Singapore Plans to Cut Off Internet Access for Government Agencies

"Singapore is planning to cut off web access for public servants as a defence against potential cyber attack," according to a report today in the Guardian. ›››

ICANN Gets an In-House Physical Security Operations Professional

ICANN has announced a new hire, Mark Jardina – an expert in global security and health and safety as Vice President of Security Operations. ›››

BT Confirms IPv6 Will Be Enabled on Their Network as Early as Fall

BT, United Kingdon's ISP, has confirmed IPv6 will finally be enabled on their network from this Autumn 2016 – but it will be early 2017 before all of their customers can use it, Mark Jackson reported today in ISPreview.co.uk. ›››

Iran Launches Its First Private Cloud Data Center

Iran has officially launched its first cloud data center in Tehran during a ceremony attended by the Minister of Communication and Information Technology," according to reports from local news sites. ›››

Russian Central Bank Announces Mandatory Cyber-Security Regulations for Domestic Banks

"Russian banks will be faced with a whole range of new regulations, and penalties for non-compliance, when it comes to cyber-security, according to the country's Central Bank," Eugene Gerden reported today in SC Magazine UK ›››

IPv6 Now Dominant Protocol for Traffic Among Major US Mobile Providers

"Major Mobile US Networks Pass 50% IPv6 Threshold," reports Mat Ford, Technology Program Manager at the Internet Society (ISOC). ›››

Clothing Retailer Eddie Bauer Confirms Point-Of-Sale Malware, All US, Canadian Stores Infected

In a press release yesterday evening, retailer Eddie Bauer confirmed a point-of-sale malware infection suspected by some sources as early as beginning of last month. ›››

Massive Cyberattack Aimed at Flooding .Gov Email Inboxes With Subscription Requests

"Massive Email Bombs Target .Gov Addresses," Brian Krebs writes in Krebs on Security: "Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists." ›››

NTIA Asks for Input from Organizations That Have Implemented IPv6

National Telecommunications and Information Administration (NTIA) released a stement today seeking input as part of its efforts to increase IPv6 adoption. ›››

Chinese Cloud Vendors Benefitting from Home-Field Advantage While Expanding Globally

China's home grown firms are not only grabbing domestic businesses but also venturing to different countries across the world. On the other hand, foreign players face regulatory walls that make it difficult to tap businesses in China." Saibal Dasgupta reporting today in VOA ›››

Code Released by 'Shadow Brokers' Raises Alarming Concerns on Whether NSA Was Hacked

The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. ›››

NTIA to Allow IANA Functions Contract to Expire October 1

On Friday, ICANN informed NTIA that it has completed or will complete all the necessary tasks called for in the transition proposal by the end of the contract term. ›››

Mysterious Hacker Claims to Have Hacked a Group Linked to the NSA

A mysterious hacker or hackers going by the name 'The Shadow Brokers' claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files. ›››

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. ›››

ICANN Announces Newly Created Organization to Replace IANA

ICANN has announced the name of the newly incorporated organization, Public Technical Identifiers (PTI), as a nonprofit entity to begin operation as 'Post-Transition IANA'. ›››

Data Growth, IoT Will Lead to Unlimited Energy Consumption If Not Controlled, Scientists Warn

Researchers from Lancaster University's School of Computing and Communications have warned that the rapid growth of remote digital sensors and devices connected to the internet -- Internet of Things -- has the potential to bring unprecedented and, in principle, almost unlimited rises in energy consumed by smart technologies. ›››

Google Shows Signs of Agressive Plan for Nationwide Wireless Broadband

Google Fiber is planning a move from the expensive and slow-moving physical pipes strategy to deployment of wireless network, according to an FCC filing. ›››

Syria Shuts Down Internet to Prevent Cheating During National High School Exams, Say Insiders

Early this morning in Syria, the Internet was almost entirely down for four hours. It was the ninth such outage since 31 July 2016 -- each one lasting from approximately 4am to 8am local time. ›››

Swimming Australia Website Comes Under DDoS Attack in Wake of Allegations Against Chinese Swimmer

The website of Swimming Australia has come under DDoS attack just hours after the Australian Bureau of Statistics went back online following a similar attack bringing the online census initiative to a halt. ›››

Popular News – Last 30 Days

Recent Comments

ICANN the Machine...
Examining IPv6 Performance - Revisited
ICANN the Machine...
ICANN the Machine...

Cartoons  –  From the Community

Cruz Enters Fadi's Chinese Porcelain Shop

Sponsored Topics

Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25
Afilias

DNS Security

Sponsored by
Afilias
Verisign

Security

Sponsored by
Verisign

Industry Updates

LogicBoxes Launches the New Elite Reseller Program

LogicBoxes LogicBoxes, the leading provider of web presence automation solutions for Web Hosts, Domain Resellers and ICANN Registrars, today announced the launch of its new Elite Reseller Program. This program lays a strategic focus on fast-growing Web Hosting Providers. more»

Miss.Africa Announces 2016, Round II Seed Funding Tech Initiative for Women in Africa

DotConnectAfrica In a #STEM4girls Pan-African campaign, the Miss.Africa program is mobilizing a Round II Seed Fund for Tech initiatives in Africa that will avail small grants to support women and girls in the Science, Technology, Engineering and Mathematics (STEM) fields to launch or expand their own initiatives. more»

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Neustar Neustar this week published a research report, "DNSSEC: How Savvy DDoS Attackers Are Using Our Defenses Against Us," detailing how Domain Name System Security Extensions (DNSSEC) can be subverted as an amplifier in Distributed-Denial-of-Service (DDoS) attacks. more»

Airpush Chooses DeviceAtlas to Provide Device Awareness to Mobile Ad Network

Afilias - Mobile & Web Services Mobile Advertising firm Airpush and Afilias announced today that DeviceAtlas is now powering device detection and targeting on its advertising network for Android and iOS apps. more»

DeviceAtlas Releases Q2 2016 Mobile Web Intelligence Report, Apple Loses Browsing Market Share

Afilias - Mobile & Web Services DeviceAtlas, a leading supplier of intelligence on mobile devices, today released its quarterly Mobile Web Intelligence Report for Q2 2016, which analyzes mobile device traffic to hundreds of thousands of websites around the world. more»

Afilias Acquires Premium TLDs .ARCHI, .BIO and .SKI

Afilias Afilias announces the acquisition of StartingDot, the Registry Operator for 3 new TLDs: .ARCHI, .BIO and .SKI. The acquisition agreement is part of Afilias' ongoing program of acquiring new TLDs to add to its portfolio. StartingDot's TLDs are a good fit with other Afilias TLD's such as .ORGANIC, .GREEN, .BLUE, and .PRO. more»

Effective Strategies to Build Your Reseller Channel (Webinar)

LogicBoxes Join us on Wednesday, August 10th, for a webinar with Shridhar Luthria, Executive Vice President for Channel Businesses at the Endurance International Group, where he'll help you piece together your reseller strategy for your growing web presence business. more»

Radix Adds Dyn as a DNS Service Provider

Radix Radix has contracted global industry leader Dyn to become its second supplier of DNS services for all its new domains. Dyn's DNS service will run concurrently with Radix's existing DNS services, thereby adding a layer of DNS redundancy. more»

Facilitating a Trusted Web Space for Financial Service Professionals

Boston Ivy New Top Level Domains, .CFD and .Spreadbetting domain extensions act as a mark of trust to potential clients. A unique verification service provided by the domain Registry, Boston Ivy, is changing the landscape of the internet and the world of online trading. more»

Ready or Not, 5 Big Tech Trends Headed Your Way

Boston Ivy With so much innovation in the fast moving world of technology, it is difficult to have a clear crystal ball but here we present our synopsis of what we believe might lie in store! more»

What are the World’s Most Popular Smartphones

Afilias - Mobile & Web Services DeviceAtlas a leading supplier of intelligence on mobile devices, has released its latest statistics on most popular smartphones in different countries based on the amount of web traffic these phones generated in Q1 2016. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Timothy Denton
lawyer, former national regulator (CRTC)Joined on Sep 29, 2003

Olaf Kolkman
Chief Internet Technology Officer (CITO), Internet SocietyJoined on Apr 16, 2015

Robert Rozicki
One of those domain name typesJoined on Sep 15, 2004

Ron Aitchison
Consultant, developer and authorJoined on Oct 04, 2005

Bruce Young
Senior Desktop Support AnalystJoined on Jun 14, 2003

Joi Ito
Joined on Apr 11, 2005

Alexa Raad
CEO of ArchitelosJoined on Jun 22, 2006

Tom Daly
Chief Scientist and Co-Founder at Dyn IncJoined on Oct 15, 2008

J.D. Falk
Internet Standards and GovernanceJoined on Apr 02, 2008

Ewan Sutherland
Telecommunications Policy AnalystJoined on Jan 01, 2006

Bill St. Arnaud
Green IT Networking ConsultantJoined on Dec 05, 2011

Dan York
Author and Speaker on Internet technologies - and on staff of Internet SocietyJoined on Apr 24, 2007

Maik Hassel
Product Manager at Incognito Software SystemsJoined on Jul 27, 2016

Pinkard Brand
VP Strategy & Partner Relations, TLD Registry LimitedJoined on Jul 29, 2010

Cedric Manara
Law ProfessorJoined on Jun 09, 2004

Terry Zink
Program ManagerJoined on Aug 20, 2007

Daniel J. Weitzner
Technology and Society Policy DirectorJoined on Apr 09, 2004

Steve Stolfi
VP of Global Partnerships at CT CorsearchJoined on Aug 09, 2010

Stéphane Van Gelder
StartingDot, MILATHANJoined on Aug 27, 2008

Matt Blumberg
CEO and Chairman at Return PathJoined on Feb 02, 2006

Kloot
Joined on May 04, 2012

Greg Reber
CEO of AsTech ConsultingJoined on Jun 30, 2010

Irwin Lazar
AnalystJoined on Apr 24, 2007

Arun Raghu
Technology Policy AdviserJoined on Apr 21, 2015

Laura Atkins
Founding partner of anti-spam consultancy & software firm Word to the WiseJoined on Nov 12, 2009

Baher Esmat
Joined on Dec 26, 2007

Karl Auerbach
Chief Technical Officer at InterWorking LabsJoined on Jun 14, 2003

Jacob Malthouse
ICANN NTAG Chair, Co-founder at Big Room Inc.Joined on Sep 29, 2011

John Curran
President and CEO at American Registry for Internet Numbers (ARIN)Joined on Mar 31, 2007

Phil Buckingham
CEO, Dot Advice LimitedJoined on Dec 03, 2009