New document : 5 minutes to understand DNS cache poisoning

The DNS (Domain Name System) is a key service of the Internet. It is a giant, hierarchical and distributed directory that associates IP addresses with domain names that are easier to identify, remember and transmit. It is the cornerstone of the Internet, whose infrastructure has flaws by its very conception, making it an ideal target for attacks. On one hand, the DNS service is based on the authoritative DNS, which holds the information, and on the other hand, the resolver DNS, which ca... Read More

ICANN72, between prioritisation needs and fragmentation risks

At the end of October, the 72nd ICANN summit was held, devoted to the development of policies that impact the domain name system (DNS) and the global Internet community. As already announced during the past summer, this latest annual meeting was to be held by videoconference in the time zone of Seattle in the United States. “Sleepless” were therefore not in Seattle but rather in Europe. The thorn in the side of the next round of new generic extensions A month before th... Read More

New document : 5 minutes to understand domain names extensions (TLD)

The “Top Level Domains” also called TLD or extensions, are defined by the IANA (Internet Assigned Numbers Authority) which depends on ICANN since 1998. ICANN and IANA are in charge of allocating Internet protocol (IP) addresses space, assigning protocol identifiers and managing the top level domain names system, i.e. the “Top Level Domains”. Find out in this “5 minutes to understand” document, available for download on the Nameshield’s website, the ... Read More

New document : 5 minutes to understand who manages the Internet

There is a multitude of players involved in the management of the network of networks !Its management is the responsibility of a decentralized and international multiparty network of independent groups from civil society, private sector, governments, academic and scientific communities, and national and international organizations. Find out in this “5 minutes to understand document”, available for download on the Nameshield’s website, who manages the Internet, what are the ro... Read More

Data escrow no longer escapes the concentration of the domain names industry

There is a lot of talk about the concentration that is taking place in registries and registrars, two of the key actors in the domain names ecosystem. The two companies that have been in the news the most in the last two years, are Ethos Capital and Clearlake Capital, two private equity firms that have specialised in acquisitions in this sector. Ethos Capital, founded in 2019, had proposed in November in a 1.135 billion euros deal to acquire Public Interest Registry, the registry in char... Read More

What is Extended Validation (EV) and how important is it?

SSL certificates ensure the encryption and integrity of data exchanged between a browser and a web server. There are different levels of certificates, Extended Validation (EV), Organizational Validation (OV) and Domain Validation (DV), which vary depending on the degree of authentication. The Extended Validation type SSL certificate provides the highest level of SSL authentication. It is obtained through a comprehensive and globally standardized identity verification process established by ... Read More

New document : 5 minutes to understand the DNS resolution of domain names

Human beings have a very bad memory for number sequences. However, computers and servers communicate with each other by identifying themselves through an IP address, which is a sequence of numbers or a mix of numbers that is very complex to memorize and differentiate.To help people communicate over networks, the Domain Names System (DNS) was invented. This service is a giant Internet directory, hierarchical and distributed worldwide, which associates domain names with IP addresses.When a we... Read More

Phishing, slamming and other fraudulent e-mails: stay alert during the summer holidays!

Every year, the summer holidays announce the upsurge of fraudulent e-mails mass campaigns. Indeed, cybercriminals try to profit from these periods when the vigilance is sometimes lowering, to launch phishing e-mails. What are phishing and slamming? Phishing is used by cybercriminals to obtain personal information in order to commit an identity theft. In the world of phishing (for 80% of companies this is the entry vector for attacks in 2020), the slamming is a well-known... Read More

ICANN71: GAC in the spotlight

Image source : icann.org website Some 56 sessions were scheduled as part of the 71st ICANN Summit in The Hague. Held once again exclusively by video conference due to the global health situation, no less than a quarter of these sessions were organised by the GAC, the governmental advisory committee that advises ICANN on public policy issues related to ICANN’s responsibilities in the domain name system. The GAC has been very active on all current ICANN policy issues and has clearly made... Read More

New document : 5 minutes to understand the URS procedure

The URS (Uniform Rapid Suspension System) procedure is the latest domain name dispute resolution procedure implemented by ICANN for new extensions. This procedure allows to sanction obvious and indisputable infringements of a trademark right resulting from the registration by third parties of identical or similar domain names regarding the new extensions. Find in this “5 minutes to understand” document in which cases the URS procedure applies and what are the rules and conditions to r... Read More