Blogs

What Does Blockchain Have to Do With Voting?

Apropos of recent news stories about a blockchain-based voting system that was hacked before its first election, someone asked: "Perhaps final recognition that a lot of blockchain is hype? Or simply an interesting side-story?" A blockchain can ensure that the lies you see are the same lies that were published, but that doesn't have much to do with voting. more

Questions Raised by the Takeover of SNET, Havana’s Community Network

Last May, Cuba's Ministry of Communication (MINCOM) announced resolutions 98 and 99 limiting wireles stransmission power and outdoor cables that made community networks like Havana's SNET, illegal. Since SNET was the world's largest community network that did not have Internet access, implementation of the resolutions was postponed for 60 days for negotiations between SNET administrators and MINCOM. more

Worldwide Broadband Trends as the World Wide Web Turns 30

Hootsuite is the premier tracker of social media usage around the world. They publish numerous reports annually that track broadband statistics and social media statistic from around the world. They report the following statistics for the end of 2018. The world has been seeing one million new users online every day since January 2018. That means there are 11 new users on the web every second. There are now 5.11 billion mobile subscribers in the world, 67% of the world's population. more

Proactive Cybersecurity: What Small Businesses Can Actually Do

In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more

Threat Intelligence in Latter 2019: Overcoming the Same and New Challenges

Does threat intelligence (TI) work? I looked into that question last year, exploring the reasons why it actually doesn't and what can be done to remediate the situation. Since then, more companies have incorporated TI into their security processes, and many are still not getting the benefits they expect. What's causing the dissatisfaction? Interestingly, pretty much the same aspects... more

Almost All 5G Estimates for 2019-2020 Need to Be Doubled

The remarkable take rate in Korea and China is invalidating almost all projections of 5G subscriptions. The 5G promotion has consumers wanting to buy, buy, buy. Huawei Mate 20 5G is selling for only US$30 more than the 4G model. At that price, who would want to buy a 4G phone that could be obsolete in a year or two? In the first two weeks of sale, over a million Chinese bought Huawei's 5G phone. more

Domain Name Registrar Isn't Liable for Counterfeit Goods – InvenTel v. GoDaddy

InvenTel makes security cams for cars. It is trying to crack down on Chinese counterfeiters. It brought a prior lawsuit against a wide range of defendants, including GoDaddy. InvenTel voluntarily dismissed GoDaddy from that suit. It brought a second round of litigation involving a new counterfeit site allegedly by the same bad guys, www.hdminorcarnbuy.com, a domain name registered via GoDaddy. more

The Pros and Cons of Introducing New gTLDs

Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more

The Promise of Multi-Signer DNSSEC

DNSSEC is increasingly adopted by organizations to protect DNS data and prevent DNS attacks like DNS spoofing and DNS cache poisoning. At the same time, more DNS deployments are using proprietary DNS features like geo-routing or load balancing, which require special configuration to support using DNSSEC. When these requirements intersect with multiple DNS providers, the system breaks down. more

Call Spoofing: Congress Calls on FCC, Russia and China Answer

It is both amusing and dismaying. Last year, Congress passed Ray Baum's Act telling the FCC to do something about those pesky incoming foreign SPAM calls and texts with the fake callerIDs. The FCC a couple of weeks ago responded with a chest thumping Report and Order claiming it has "extraterritorial jurisdiction" that is does not have, and promising it will do something. Don't hold your breath on that one. more

The 2019 IPv4 Market: Mid-Year Report

After a slow start to 2019, the volume of IPv4 numbers traded is picking up – though still far below the peak trading periods of 2018. By this same time last year, the total quantity of numbers flowing to and from organizations in the ARIN region was just over 27 million. more

Are the Telcos Crying Wolf?

We recently have heard much complaining from the telecommunications companies concerning the margin squeeze they experience from NBN Co. While they certainly do have a point, it is also essential to look at the other side of the coin. Why have the telcos allowed this situation to happen in the first place? We have seen an explosion in the telecommunications industry over the last decades. This led to the arrival of internet companies which are currently amongst the largest corporations in the world. more

MANRS Observatory: Monitoring the State of Internet Routing Security

Routing security is vital to the future and stability of the Internet, but it's under constant threat. Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, driven by the networking community and supported by the Internet Society, aiming to reduce the most common threats to the Internet's routing system through technical and collaborative action. more

There is Always a Back Door

A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. more

Satisfying the Evidentiary Demands of the UDRP

It continues to surprise that some counsel in proceedings under the Uniform Domain Dispute Resolution Policy (UDRP) are unaware or oblivious of its evidentiary demands, by which I mean they file and certify complaints with insufficient evidence either of their clients' rights or their claims. Because the UDRP requires conjunctive proof of bad faith registration and bad faith use (as opposed to the disjunctive model of the Anticybersquatting Consumer Protection Act), it should be ingrained for counsel experienced in the jurisprudence to know they cannot hope to succeed with marks postdating registration of domain names. more

News Briefs

WIPO Becomes First Non-Chinese Entity to Provide Domain Dispute Resolution Services for China's .cn

Huawei Founder in a Staff Memo Warns Company Is Facing a 'Live-or-Die Moment'

Google Showing Signs of Increased Concerns Over Rising Data Privacy Scrutiny

Study Reveals U.S. Carriers Throttle Online Video on Their Mobile Networks Even When Not Congested

Irland Leads Europe's .eu Domain Registrations in Q2

Huawei Launches Its Own Operating System, Says Its Completely Different From Android and iOS

There's a Full-On War for Cybersecurity Talent, CEOs Forking Millions to Fill Roles

URS Is a Bad Fit for .ORG, Says EFF

8chan Website Pushed Offline Over Ties to the Mass Shooting in El Paso

OneWeb Fails in Latest Attempt to Get Russian Approval for Its Worldwide Internet Coverage Plan

Close to 200K Phishing Domains Discovered in a 5-Month Span, 66% Targetted Consumers, Akamai Reports

A Seattle Woman Charged With Capital One Data Theft Affecting 106 Million People

Namecheap Files 'Request for Reconsideration' Against ICANN's Removal of .ORG Price Caps Decision

Gartner Says Worldwide IaaS Public Cloud Services Market Grew 31.3% in 2018

Telesat and the Government of Canada Join Forces to Tackle Canada's Digital Divide

A 60% Rise Reported on Malware Designed to Harvest Consumers' Digital Data, aka Password Stealers

Nominet, the .UK Operator Says Its Domain Dispute Resolution Service Has Saved £180 Million to Date

Equifax Announces Comprehensive Consumer Settlement for the 2017 Data Breach

Other Countries Beginning to Adopt China's Unique Approach to an Isolated Internet Structure

New Zealand’s Domain Name Commission Wins Appeal in Lawsuit Against US DomainTools

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection

There are no participants in this section yet.