We have just released the 2025 edition of the DOTZON study "Digital City Brands." Since first presenting the study in early 2017, DOTZON has now analyzed for the ninth consecutive year how cities successfully use their Digital City Brands. The Digital City Brand represents the digital aspect of a city's brand and reflects how digitally advanced a city is. The emergence of the Internet was the reason Digital City Brands were created in the first place. more
What happens when governments don't just regulate content, but forcibly repurpose the very guts of the Internet's infrastructure to enforce their policies? The chilling answer, increasingly evident worldwide, is widespread, devastating collateral damage. Around the world, neutral systems like Domain Name System (DNS) resolvers and IP routing, the bedrock of our digital lives, are being weaponized as enforcement tools. more
Competition has been creeping into broadband pricing for the last several years as cable companies have been using low introductory rates to try to win new customers and offering similarly low prices to try to keep them. Anybody who competes against the big cable companies will tell you that cable companies have been competing for years by offering two-year promotional prices to keep customers. However, competition might have gone into a new gear recently... more
The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more
On 17 May 1865, 20 European states convened to establish the International Telecommunication Union (ITU) to streamline the clunky process of sending telegraph messages across borders. 160 years later, ITU's anniversary is more than a mere commemorative moment; it is a stark reminder that multilateral cooperation is beneficial and necessary in our increasingly interconnected world. more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
The introduction of GDPR in 2018, and the subsequent tightening of privacy regulations around the world, was a necessary step toward protecting user data. Consumers gained critical rights over their personal information, and companies were forced to adopt stronger standards for how they collect, store, and use that data. However, one unintended consequence has been the erosion of access to domain registration information once easily available through WHOIS databases. more
Negotiation processes in the UN are remembered not just for what came out of them, but also for what they were like, who participated, and how they were conducted. People who participated in the first World Summit on the Information Society (WSIS) back in 2003 and 2005 often talk about the process, its challenges and its achievements. more
Cyber criminals are the kings of recycling. Once they've found a tactic that works well, they'll keep doing it as long as they can get away with it. That's why it's so important for research teams to keep a close eye on what's happening behind the scenes with web traffic. Case in point? Our team at DNSFilter recently analyzed global DNS activity from the first quarter of 2025 and identified several notable trends. more
This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit... more
Netscout recently released its latest Threat Intelligence Report that documents DDoS attacks in the second half of 2024. As has been the trend for many years, the largest target of DDoS attacks has been ISP networks. There were over 8.9 million DDoS attacks documented in the second half of last year, up 12.75% over the first half of the year. more
After several delays due to bad weather, Amazon's Project Kuiper finally launched its first batch of low-orbit broadband satellites on April 28. The company says it is in communication with all 27 new satellites. Amazon used a United Launch Alliance (ULA) Atlas V rocket launched from Cape Canaveral. Amazon is under pressure to get the launches going and has a commitment to the FCC to launch 1,618 satellites by July 2026. more
The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications. If the same efficiency improvements had been made in the automobile industry cars would cost a couple of dollars, would cost fractions of a cent to use for trips, and be capable of travelling at speeds probably approaching the speed of light! more
The debate surrounding digital sovereignty has gained momentum in recent years, particularly within BRICS nations, where governments seek to assert greater control over their digital ecosystems. Proponents of digital sovereignty often frame it as a necessary countermeasure against foreign technological dominance, positioning it as either a "positive" force- fostering local innovation and self-reliance- or a "negative" one- fueling authoritarian control and economic isolation. more
The World Summit on Information Society (WSIS) convened by World leaders in 2003 and 2005 following the realization of the crucial roles of Information and Communications Technologies (ICTs) (also known in the industry as the Internet) played in economic growth and development. Since 2005, ICTs have added more than $10tr to the global economy (Oxford Economics, 2020). more
Tech developments saw less drama than trade and environmental shifts during Trump's first 100 days. Continuity, not abrupt change, defined his approach to AI and digital regulation. Only 9 of 139 executive orders (EOs) focused on tech. Trump's tech policy emphasised reviews and incremental shifts. Public consultations on AI, cybersecurity, and cryptocurrencies signal steady evolution over upheaval. more
Dave Taht died on April 1st. I met him only recently, and never in person, but his passing saddens me. His technical work and evangelism have improved the Internet, and I will give some examples of his contributions to the Internet community and users, but I am sad because he was a good person -- idealistic, unselfish, open, and funny. I'll miss him. First, his contributions, then his values. more
When the Internet outgrew its academic and research roots and gained some prominence and momentum in the broader telecommunications environment, its proponents found themselves in opposition to many of the established practices of international telecommunications arrangements and even in opposition to the principles that lie behind these arrangements. more
Last week, GPD, together with 114 organisations and 57 individual experts from civil society, the technical community, industry and academia, presented a set of cross-stakeholder community recommendations aimed at operationalising the modalities for the twenty-year review of the WSIS (WSIS+20). The open letter responds to the adoption on 25 March of a UN General Assembly resolution on WSIS+20 modalities, advocating for a transparent and inclusive review process that meaningfully engages all relevant stakeholders. more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a formal call for greater transparency and procedural integrity in the ongoing board elections of the African Network Information Centre (AFRINIC). more
A smartphone smuggled out of North Korea has revealed the alarming extent of digital surveillance enforced by the Kim regime. Though it resembles a modern Android device, the software within tells a darker story: every five minutes, the phone covertly captures screenshots, storing them in an inaccessible folder for later state inspection. more
A new audit has sharply challenged the Federal Communications Commission's (FCC) broadband availability estimates, revealing that 26 million Americans lack access to fixed 100/20 Mbps internet, 6.4 million more than the FCC claims. more
The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more
A wave of high-profile cyberattacks is reshaping the global insurance industry, creating both risk and reward for major players. According to a new Bloomberg report, firms like Munich Re and Chubb are capitalising on surging demand for cyber insurance as artificial intelligence makes digital breaches more frequent and destructive. more
Japan Post said Monday that it has launched a "digital address" system that links seven-digit combinations of numbers and letters to physical addresses. more
As the European Union presses ahead with its European Democracy Shield (EUDS) to counter foreign disinformation, European country code top-level domain (ccTLD) registries are urging caution. more
On April 28th, a widespread blackout plunged millions across Spain, Portugal, and parts of south-west France into darkness, disrupting homes, transit systems, and even sporting events like the Madrid Open. more
Afnic, the .FR Top Level Domain registry published its annual report that details the activity of .FR over the past year. Analyses of the specificities of the French Internet domain and domain market trends in France in 2024. more
The Colombian's Ministry of ICT (MinTIC), and ccTLD Manager for the .CO ccTLD, recently announced an expedited timeline for the Request for Proposal (RFP) to operate over 3 million .CO domains for the next 10 years. The proposed 10-year term is double the current five-year term. This represents the latest in a series of recent RFPs associated with several high-profile TLDs before ICANN's planned roll-out of new gTLD early next year. more
Governments across Africa increasingly wield internet blackouts as a tool to suppress dissent, with 2024 marking a record high for digital censorship. According to a report by Access Now and #KeepItOn, 21 internet shutdowns were recorded across 15 African nations, surpassing previous highs in 2020 and 2021. more
Elon Musk has attributed a series of major disruptions on X, the social media platform he owns, to a large-scale cyberattack. The outages, which persisted for several hours today (and are still ongoing), left users unable to access the service, triggering a flurry of speculation. more
A recent study has revealed that broadband competition remains severely limited in 96% of U.S. counties, leading to significantly higher internet costs for consumers. Using the Herfindahl-Hirschman Index (HHI), researchers at BroadbandNow Research analyzed broadband market concentration across 3,143 counties and found a direct link between limited provider options and inflated prices. more
Meta has unveiled plans for an ambitious undersea cable project that, at 50,000 kilometers (31,000 miles), would be the longest in the world—surpassing the Earth’s circumference. Dubbed Project Waterworth, the infrastructure aims to link the United States with India, Brazil, South Africa, and other regions, bolstering global connectivity and supporting artificial intelligence (AI) development. more
In a bid to bolster cybersecurity in India's financial sector, the Reserve Bank of India (RBI) has announced exclusive internet domains -- 'bank.in' for registered banks and 'fin.in' for non-banking financial entities. RBI Governor Sanjay Malhotra revealed that registrations for 'bank.in' will commence in April 2025, followed by 'fin.in', with the initiative aimed at reducing phishing attempts and fortifying digital banking trust. more
In 2011, a 12-year-old unknowingly predicted Bitcoin's rise in a forgotten YouTube video. Now, crypto enthusiasts have rediscovered it, launching $TPU, a Solana-based memecoin named after his old channel. The internet is hailing him as an accidental visionary, proving once again that the digital world never forgets -- and that early tech predictions can age like fine wine. more
NordVPN has introduced NordWhisper, a new protocol designed to bypass VPN restrictions in countries such as Russia and India. The protocol mimics regular internet traffic, making it difficult for internet service providers (ISPs) and websites to detect and block VPN usage. more
Today marks a significant shift in how internet registries manage domain name data as the Registration Data Access Protocol (RDAP) officially replaces the legacy WHOIS system. Designed to address privacy and data access challenges, RDAP modernizes how information about domain registrations is queried and provided. more
An underwater data cable linking Sweden and Latvia was damaged early Sunday, marking the fourth such incident in the Baltic Sea, fueling concerns within NATO regarding the security of critical infrastructure. more
NATO’s HEIST project tackles the vulnerability of undersea internet cables by testing satellite backups and advanced monitoring. The initiative aims to safeguard global communications against accidental damage and potential sabotage. more
Europe has embarked on its most ambitious space initiative in a decade, unveiling plans to build the €10.6bn Iris² satellite network. more
The domain industry in 2024 revealed notable shifts in registration patterns, signaling an evolving online landscape. According to a newly published report by Namecheap, .shop climbed to become the second-most-popular top-level domain (TLD), boasting over 721,000 registrations, displacing .xyz after years of dominance. Among country-code TLDs (ccTLDs), .me rose to the top, marking its ascent from eighth place in 2023. more
The Council of European National Top-Level Domain Registries (CENTR) has released a public version of its 2024 Renewal Study, offering insights into the dynamics of domain retention within country code top-level domains (ccTLDs). more
American officials have revealed an ongoing struggle to expel Chinese hackers from telecommunications networks, months after the espionage was first discovered. The campaign, attributed to a group called "Salt Typhoon," has infiltrated major telecom carriers, particularly in the Washington region. more
Meta, the parent company of Facebook, Instagram, and WhatsApp, is embarking on an ambitious $10 billion project to construct a privately-owned, 40,000-kilometer subsea cable network. Dubbed the "mother of all submarine cables," this endeavor aims to bolster Meta's data infrastructure and sidestep geopolitical risks associated with traditional cable routes. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
The SideWinder advanced persistent threat (APT) group, active since 2012 and known for targeting government, military, and business entities throughout Asia, primarily Pakistan, China, Nepal, and Afghanistan, has struck once again. This time around, the threat actors updated their toolset and created new infrastructure to spread malware and control compromised systems. more
Based on our Q1 2025 ranking of the most popular gTLDs and ccTLDs, the same players pretty much made the list. The .com gTLD remained in first place while the other gTLD extensions like .xyz, .top, and .shop lagged far behind. Among the ccTLDs, only .de made it to the top 10. more
Attaxion, the external attack surface management (EASM) vendor with industry-leading asset coverage, announces the integration of the European Vulnerability Database (EUVD) into its platform. more
HUMAN's Satori Threat Intelligence and Research Team recently uncovered and partially disrupted BADBOX 2.0 in collaboration with Google, Trend Micro, Shadowserver, and other partners. The threat has been dubbed "the largest botnet of infected connected TV (CTV) devices" uncovered to date. more
Cisco Talos recently uncovered multiple Lotus Blossom cyber espionage campaigns targeting government, manufacturing, telecommunications, and media organizations. The group used Sagerunex and other hacking tools after compromising target networks. more
Choosing an attack surface management or a vulnerability management platform often comes down to identifying which tool provides the right mix of visibility, automation, and precision that matches your team's needs, ideally at as low a price as possible. more
Symantec recently reported that a China-based threat actor who has been involved in installing backdoors in the systems of target government institutions (i.e., cyber espionage) has turned toward spreading RA World ransomware (i.e., a cybercriminal act) this time. Going from one act to the other is not usual for attackers. more
The market for IPv4 addresses is showing signs of a gentle deflation. According to April 2025 sales data from IPv4.Global by Hilco Streambank, the average price per address has declined across all block sizes. more
Each year, threat actors zoom in on U.S. taxpayers in a bid to intercept their payments and line their pockets instead. And while the tax day - 15 April 2025 - has passed, those who need more time can settle their dues up to 15 October 2025 without getting penalized if they requested an extension. more
Outpost24 recently discovered that rising cybercriminal entity EncryptHub inadvertently exposed elements of its malicious enterprise. The security investigation unveiled previously unknown aspects of the group's infrastructure, tools, and behavioral patterns. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more