Hot Topics:   Cybersecurity    Policy & Regulation    Wireless    Internet Governance    Domain Names    Mobile Internet    Access Providers   

Featured Blogs

Making Voting Easy is Scaring the Life Out of Security Experts

Dr. John R. Patrick Apollo 11 was the spaceflight which landed the first two humans on the Moon. Commander Neil Armstrong and lunar module pilot Buzz Aldrin landed the Apollo Lunar Module, Eagle, on July 20, 1969. Armstrong became the first person to step onto the lunar surface six hours later, and Aldrin joined him 19 minutes later. The two astronauts spent about two and a quarter hours outside the spacecraft, and they collected 47.5 pounds of lunar material to bring back. more

The Impact of Satellite Broadband

Doug Dawson Recently I've had several people ask me about the expected impact of low-orbit satellite broadband. While significant competition from satellites is probably a number of years away, there are several major initiatives like StarLink (Elon Musk), Project Kuiper (Amazon), and OneWeb that have announced plans to launch swarms of satellites to provide broadband. more

Food for Thought on the "New TLD" Business Models

Loic Damilaville There is always some degree of confusion in discussions about the "new TLDs". Some points of view try to be optimistic, others on the contrary only highlight the bad news, and most refer indistinctly to the "new TLDs" as if they did not break down into different segments, each of which obeys dynamics and constraints of its own. The purpose of this post is to provide some food for thought and to shed some light on those dynamics and constraints... more

Might Satellite Constellations Learn to Avoid Debris?

Larry Press The European Space Agency (ESA) reported that as of January 2019 there were about 5,000 satellites in space and 1,950 of them are still functioning. Hopefully, those functioning satellites have fuel and thrusters that will enable them to de-orbit and (mostly) burn up in the atmosphere when their useful life is finished. The remaining 3,050 are slowly drifting, along with a lot of debris. The ESA estimates that there have been over 500 break-ups, explosions, collisions, or anomalous events... more

Back to the Future Part IV: The Price-Fixing Paradox of the DNS

Greg Thomas GenX-ers may remember spending a summer afternoon at the movie theater and seeing the somewhat corny but beloved antics of Marty McFly and Doc as they used a souped-up Delorean to travel the space-time continuum. In Back to the Future Part II, Doc and Marty travel into the future, where the bullying, boorish Biff causes a time-travel paradox when he steals the Delorean and takes a joyride into the past to give his younger self a sports almanac containing the final scores of decades worth of sporting events. more

Trump Orders Cyberattacks by US Companies

Anthony Rutkowski It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more

Threat Intelligence Platform in Action: Investigating Important Use Cases

Jonathan Zhang As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

Broadband and Food Safety

Doug Dawson I recently saw a presentation that showed how food safety is starting to rely on good rural broadband. I've already witnessed many other ways that farmers use broadband like precision farming, herd monitoring, and drone surveillance, but food safety was a new concept for me. The presentation centered around the romaine lettuce scare of a few months ago. The food industry was unable to quickly identify the source of the contaminated produce and the result was a recall of all romaine nationwide. more

A Closer Look at the "Sovereign Runet" Law

Ilona Stadnik In December 2018, a bill on the "stable operation" of the Russian segment of the Internet was introduced and got the title "Sovereign Runet" in mass media and among the public. It was adopted after 5 months later, despite doubts about the technical feasibility of its implementation. The law is very ambitious in its intent to simultaneously control Internet traffic and protect Runet from some external threats, but legislators still have no idea how it would actually work. more

SpaceX Reports Significant Broadband Satellite Progress

Larry Press SpaceX delayed last Wednesdays Starlink launch due to high winds and on Thursday they decided to do a software update and postpone the launch until next week, but they revealed significant progress in their Starlink mission press release and in tweets by and a media call with Elon Musk. The mission press release said SpaceX has significantly reduced the size and weight of their satellites. more

A Report on the ICANN DNS Symposium

Geoff Huston By any metric, the queries and responses that take place in the DNS are highly informative of the Internet and its use. But perhaps the level of interdependencies in this space is richer than we might think. When the IETF considered a proposal to explicitly withhold certain top-level domains from delegation in the DNS the ensuing discussion highlighted the distinction between the domain name system as a structured space of names and the domain name system as a resolution space... more

Know Someone Who Has Made the Internet Better? Postel Service Award Nominations Deadline May 15

Dan York Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet? more

Gall's Law and the Network

Russ White In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... more

How Do You Know if You're Choosing the Best IP Geolocation API?

Jonathan Zhang If you can't address your customers and the people interacting with your network face to face, at least know where they are -- anywhere in the world, anytime you want to. That's possible with geolocation technology, and many businesses are keen on acquiring the best IP geolocation API for cybersecurity and other purposes. However, before committing to a particular solution, each product needs to be carefully evaluated according to the exact needs of a prospective buyer. more

Satellite Internet Service Progress by SpaceX and Telesat

Larry Press This has been a busy week in the race to deploy constellations of low-earth orbit (LEO) Internet-service satellites. In their quarterly report, Telesat mentioned progress in two, disparate markets. As I noted earlier, they have signed their first LEO customer - Omniaccess a provider of connectivity to the superyacht market. more

News Briefs

SpaceX Succeeds in Launching Its First Full Batch of Starlink Internet Satellites

SpaceX on Thursday successfully launched 60 Starlink satellites with its Falcon 9 rocket from Space Launch Complex 40 at Cape Canaveral Air Force Station, Florida. more

UK Announces $28M Fund for Army Cyber Operations Centers

The UK Ministry of Defence has announced a £22m ($28 million) fund for the development of British Army cyber operations centers across the country. more

Baltimore Gets Hacked: Main Computer Systems Crippled, Experts Estimate Months to Recover

On May 7, hackers breached parts of the computer systems that run Baltimore's government, taking down essential systems such as voice mail, email, a parking fines database, payment systems used for water bills, property taxes, real estate transactions and vehicle citations. more

US Huawei Ban Threatens Internet Access in Rural Areas, Some Providers May Fold

Much of rural America with very low population density, depends on small wireless carriers for their internet access as AT&T, T-Mobile and other large providers have no interest in providing services. more

DDoS Storm Is Coming, Warn Researchers Noting an 84% Surge in the First Quarter of 2019

The number of DDoS attacks during the first three months of 2019 increased by 84%, compared with the previous quarter. more

Qualcomm’s Licensing Practices Are Illegal, U.S. Judge Rules

A U.S. district court judge rules that Qualcomm violated anti-trust laws and has ordered the chip maker to change some of its licensing and negotiation practices. more

Microsoft Sees Serious Appetite for Revised Privacy Laws in US, Says It's Time to Match EU's GDPR

With the first anniversary of the European Union's General Data Protection Regulation (GDPR) approaching in just a few days, Microsoft's Corporate Vice President and Deputy General Counsel, Julie Brill says GDPR has been an important catalyst for progress in privacy protection around the world. more

NGOs, Academics Warn Against EU’s Deep Packet Inspection Problem, at Least 186 ISPs Breaking Rules

European Digital Rights organization (EDRi) along with 45 NGOs, academics and companies from 15 countries sent an open letter to European policymakers and regulators on Wednesday warned against the widespread use of Deep Packet Inspection (DPI) technology by Internet service providers in the EU. more

ICANN Says Amazon Inc's Application for .AMAZON TLD Can Proceed Following 30 Days of Public Comment

The giant online retailer Amazon Inc is one step away from winning the .AMAZON top-level domain name after a 7-year battle with the eight Latin American countries. more

Two Years Later WannaCry Continues to Spread to Vulnerable Devices, Nearly 5M Devices Affected

Two years after the initial wave of WannaCry attack in May of 2017, security researchers say the ransomware continues to spread to vulnerable devices. WannaCry infection has affected close to 5 million devices to date. more

WordPress Parent Company Automattic, and .Blog Operator Switches Registry From Nominet to CentralNic

The operator of .blog top-level domain, Knock Knock WHOIS There, LLC, which is a subsidiary of Automattic, the parent company of WordPress.com and Jetpack, announced on Wednesday that it is "moving into the next phase of .blog." more

Close to 735K Fraudulently Obtained IP Addresses Have Been Uncovered and Revoked, ARIN Reveals

The American Registry for Internet Numbers, Ltd. (ARIN) has won a legal case against an elaborate multi-year scheme to defraud the Internet community of approximately 735,000 IPv4 addresses, the organization has revealed. While the specifics of the findings are not released, John Curran, ARIN President and CEO said the fraud was detected as a result of an internal due diligence process. more

Huawei Says They Are Willing to Sign No-Spy Agreements With Governments

During a London conference, Huawei's chairman Liang Hua told reporters the company would sign no-spy agreements with governments as a response to United States' pressure on Europe to bar the Chinese telecommunications company over spying concerns. more

National Telecommunications and Information Administration (NTIA) Chief David Redl Resigns

David Redl, head of U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) resigned abruptly from his position on Thursday. more

US Federal Trade Commission Says It Lacks Resources to Go After Privacy Violations Effectively

At hearing on Wednesday, the U.S. Federal Trade Commission (FTC) urged Congress to pass data privacy legislation and enhance its authority to police large tech companies. more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

We Will Not Raise Prices Unreasonably, Says .ORG Operator

The operator of the .ORG top-level domain, Public Interest Registry (PIR), issued a statement assuring its community of registrants that it "not raise prices unreasonably." Also, it has no specific plans for any price increases. more

American Households Estimated to Save Over $30 Billion a Year on Broadband With LEO Satellites

Low Earth Orbit (LEO) satellites are still in their infancy, but according to one analysis, the technology could save American households more than $30 billion per year by intensifying broadband competition more

Representatives From EU, NATO, USA, Japan, Australia Hold Meeting on 5G Security and Policy Measures

Representatives from over 30 countries including nations from European Union, NATO, United States, Germany, Japan, Israel and Australia participated in the Prague 5G Security Conference this week. more

No GDPR Action Against Any Big Tech Firms Since Law Imposed Last Year, Doubts Escalate Over Enforcer

Last year Europe imposed GDPR, arguably the world's toughest standard for data privacy and now, a year later, there has yet to be any enforcement action against a big tech firm. more

Most Read – Last 30 Days

Recent Comments

5G Security Transparency
5G Security Transparency
Trump Orders Cyberattacks by US Companies
A Report on the ICANN DNS Symposium
A Report on the ICANN DNS Symposium
Gall's Law and the Network
A Short History of DNS Over HTTP (So Far)
Understanding 5G: A Basic Primer

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byAfilias

Domain Names

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

DNS Security

Sponsored byAfilias

Industry Updates

Domain Research and Monitoring: Keeping an Eye on the Web for You

WhoisXML API Maintaining an online presence isn't as simple as choosing a name, putting it up, and waiting until things turn out well. Once you're out there, you have to keep an eye on your domain and what's happening around because not doing so could put you at a disadvantage or even in danger. more

How the Best IP Geolocation API Can Support Cybersecurity Efforts

WhoisXML API Cybersecurity is pretty much a game of "hide and seek" - cybercriminals hide, cybersecurity teams seek -- and the damage is often based on how long the perpetrators are able to continue their attacks without being found. more

WHOIS History API: Powering Domain Investigations

WhoisXML API The Internet is like a beach - you will most likely leave behind footprints while you are there. And these impressions can be traced back to whoever left them. The same is true with domain ownership. That website name you plan to launch your next venture on? Its domain may have a history of its own. more

Radix's Karn Jajoo Talks GDPR Benefits, Positive Outlook of New gTLDs and Radix's Impressive Growth

Radix In a recent interview with Karn Jajoo, Head of Premium Portfolio at Radix, he discusses Radix's impressive growth in 2018, the positive impact of the EU's GDPR has been it's spawned privacy discussions in developing countries with local data privacy laws and more. more

The Era of Malware: 3 Techniques to Detect and Stay Protected

WhoisXML API A while back, creating malicious software was sort of a hobby for programmers. It was hardly ever used to make money, but more of a way to show off what one can do with a computer. more

Domain Reputation API: Scoring High Points for Deliverability and Security

WhoisXML API As scary as it may seem, everyone is a target on the Web. Worse, your susceptibility to cyber attacks, when not promptly addressed, marks you not just as a target but can even lead others to consider you as a threat. more

Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm

Neustar Neustar has released its Q1, 2019 Cyber Threats and Trends report which highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year. The report affirms that DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands. more

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

DE-CIX At the moment, the ecosystem of global interconnection and the worldwide web of subsea cables are experiencing a concurrent and dynamic expansion, making waves across the globe and generating a new era of diversified routes and developing nodes. more

4 Professions Leveraging WHOIS to Stay Ahead

WhoisXML API Who are the entities behind the domains on the Web? This question has nothing to do with stalking but is critical for various business activities. Domainers, for instance, want this information to negotiate lucrative purchases while journalists might need it to set up interviews or get leads during investigations. more

A Quick Guide to Understanding IP Geolocation API

WhoisXML API Do you know where your online customers are? Can you tell whether the right users in your network are all authorized to access its content? Are you able to detect and block suspicious traffic and devices? more

A Snapshot of the Fundamentals of Threat Hunting

WhoisXML API Like it or not but the face of cybersecurity has changed over the past few years and while conventional approach has taken a back seat lately, non-traditional methods are coming to the rescue. more

Leading Voices  –  From our corporate sponsors

Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 23,740 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 31,708 times
Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 42,998 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 5 posts viewed 36,057 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 131,156 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 14,530 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 564,659 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 203,515 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 11,427 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 134,812 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 18,283 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 52,570 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 7,955 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 58,641 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 173,437 times