European efforts to build independent cloud infrastructure face challenges from regulatory overreach and dependence on U.S. cloud providers. Some say that a balanced approach focused on collaboration and flexible standards will be needed to strengthen data sovereignty and foster regional growth. Eighty percent of corporate executives in Germany say that Europe's future prosperity will depend on secure and independent digital infrastructure. more
There was a recent article in the Wall Street Journal that noted that the business world still uses a lot of landline telephones. Landline telephones have been steadily disappearing from homes, but are still not gone. I see ISPs still selling a telephone line to 10% or more of passings, and surveys show that the average residential landline penetration rate is still somewhere between 15% and 20%. more
Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more
AI has revolutionized how we process information, optimize tasks, and conduct research. However, its integration into academia sparks ethical and practical debates. Should we limit its use? How can we assess a student's true knowledge if they employ these tools? This text explores these questions from the perspective of a technology expert who argues that banning AI is as absurd as rejecting calculators or spreadsheets in the past. more
Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more
On 29 July 2025, the UN organized a WSIS+20 Informal Stakeholder Consultation at which a number of government and stakeholder representations made three-minute statements. This was in response to the Elements Paper circulated by the WSIS+20 Review's Co-facilitators, an important initial step en route to the zero draft of the text that will be the basis of negotiations and consultations over the next months in advance of the formal WSIS Review in the UN General Assembly in December. more
The shift to IPv6 has escalated into a matter of national security, as nations lagging in adoption are increasingly exposed to cyber threats and diminished control over their digital infrastructure due to the limited availability of IPv4. With IPv6-only environments becoming more common, reliance on IPv4 may lead to slower connectivity, deepening the digital divide and potentially worsening economic disparities. In this geopolitical landscape, moving to IPv6 serves as a critical step toward maintaining digital independence. more
On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more
2025 is not a banner year for the status quo. A fashion for deregulation, ignoring processes and questioning whatever was long-established is finding enough adherents that even things which work well are being upended. That's why those looking for leverage to use in hurried dealmaking, or countries with plans to rebalance where digital power lies, may find a handy tool in ICANN. more
A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more
The future of the Internet Governance Forum (IGF) is an important part of the WSIS+20 review process. But after 20 years, the key question should now be its organizational evolution, more than just how long its mandate should be extended or whether it should be rebranded. The time has come for a constitutional moment for the IGF. A dedicated review process should take place in 2026 around three core questions. more
Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more
Today, I share a warning about serious changes to the Community Priority Evaluation (CPE) of the New gTLD Applicant Guidebook. They are not driven by public comment, but by a few voices within the SubPro Implementation Review Team - and they are very likely to lead to disastrous misappropriation of well-known community names, including those of Tribes, Indigenous Peoples and NGOs around the world. more
What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more
Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more
The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process. more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction. more
Two sets of authors sued Anthropic and Meta in San Francisco for copyright infringement, arguing that the companies had pirated their works to train their LLMs. Everyone agreed that a key question was whether fair use allowed it, and in both cases, the courts looked at the fair use issue before dealing with other aspects of the cases. Even though the facts in both cases were very similar, last week, two judges in the same court wrote opinions, coming to very different conclusions. How can that happen? Is fair use broken? more
At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
The market for IPv4 addresses, already constrained by finite supply is undergoing a period of subtle yet significant transition. Data from IPv4.Global's July 2025 report reveals a continuing decline in average prices per address - particularly among larger blocks - even as transaction volume sees a notable surge. more
A whopping 600 million cyberattacks every single day - that's what organizations face nowadays, according to the Microsoft Digital Defense Report. The sheer volume of threats, coupled with the expanding attack surfaces resulting from digital transformation, scaling, and other factors, has made attack surface monitoring a must even for organizations that were previously happy with a more traditional vulnerability management approach. more
Check Point Research published an in-depth analysis of the recent spearphishing attack launched by Iranian threat group Educated Manticore. The attackers targeted Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities. more
WhoisXML API analyzed 26.0+ million domains registered between 1 April and 30 June 2025 from the Newly Registered Domains (NRDs) Data Feed. We found out that the number of NRDs increased by 11.0% compared with the previous quarter. more
Tucows Inc. (NASDAQ: TCX, TSX: TC), a global provider of internet services, and Radix, one of the world's largest portfolio registries, announced today that Tucows Registry, part of the company's Tucows Domains operating segment, has been awarded the contract to provide back-end registry services to Radix. more
Huntress was alerted to the recent BlueNorroff attack when an end-user reported potentially downloading a malicious Zoom extension on 11 June 2025. As it turned out, the malware came disguised as a Calendly meeting invite from a supposed contact sent via Telegram. more
The Cybersecurity & Infrastructure Security Agency (CISA) added CVE-2025-32433 and CVE-2024-42009 to the Known Exploited Vulnerabilities (KEV) Catalog on 9 June 2025 after they were reportedly abused by APT28 to hack government webmail servers in an operation dubbed "RoundPress." more
The second quarter of 2025 closed with 371.7 million domain name registrations across all top-level domains (TLDs), an increase of 9.3 million domain name registrations compared to the second quarter of 2024, according to the latest issue of the Domain Name Industry Brief Quarterly Report released Thursday at DNIB.com. more
After years of steady ascent, the market for IPv4 addresses is experiencing an uncharacteristic softening. According to new data from IPv4.Global by Hilco Streambank, the average monthly price per address has declined across all block sizes, with the most striking plunge seen in the larger /16 blocks. more
Palo Alto Unit 42 reported on the latest Slow Pisces attack that engaged with cryptocurrency developers on LinkedIn. The threat actors posed as potential employers and sent malware disguised as coding challenges. Developers who took on the challenge ended up running a compromised project, infecting their systems with RN Loader and RN Stealer. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more