The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS. more
As the United Nations' Global Digital Compact (GDC) approaches its expected adoption, a growing chorus of critics warns that it threatens the very foundations of multistakeholderism in Internet governance. While the GDC aims to foster global cooperation and advance shared objectives for digital transformation, it not only centralizes power within the UN but also sidelines the Internet Governance Forum (IGF) - a platform that has, for years, been instrumental in amplifying diverse voices, especially from marginalized communities and the private sector. more
On October 20th, ICANN and Verisign renewed the agreement under which Verisign will continue to act as Root Zone Maintainer for the Domain Name System (DNS) for another 8-year term. The Root Zone sits atop the hierarchical architecture of the DNS and is essential to virtually all internet navigation, acting as the dynamic, cryptographically secure, global directory of all top-level domains that exist in the DNS. more
There was a burst of recent press about cellular service provided from satellites. This was probably prompted by the two recent hurricanes that have disabled terrestrial cellular and broadband networks in the southeast. I've seen speculation and discussion on Reddit and other forums where people have been wondering if satellite is the future of cell service and if the ubiquitous giant cell towers will eventually become obsolete. more
In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection. more
On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website. more
The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities". more
Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more
At the end of its 2024 term, the Supreme Court made two landmark rulings that limit federal agencies' regulatory powers. Loper Bright Enterprises v. Raimondo curtails their ability to create new regulations, while SEC v. Jarkesy reduces their capacity to enforce existing laws. These decisions significantly weaken agencies like the FCC in regulating sectors of the national economy, marking a substantial shift in administrative authority. more
On September 22, the United Nations General Assembly adopted the Global Digital Compact (GDC), marking one of the most significant intergovernmental agreements on digital issues in the past two decades. Appended to the Pact for the Future, the GDC is a non-binding agreement that outlines a global governance framework for a wide range of digital issues, including internet governance and the Internet Governance Forum (IGF). more
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
The Summit of the Future (SotF) was held at the United Nations Headquarters in New York on September 22 -- 23, 2024. World leaders, in the presence of stakeholders from the private sector, civil society, academic/technical communities, and youths, endorsed a landmark Pact for the Future of mankind. The Pact for the Future (P4F) (A/RES/79/1) was a significant, consensus-driven but non-binding document agreed upon by world leaders specifically on September 22, 2024. more
In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'... more
Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low). more
As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more
Global leaders gathered in New York at the Summit of the Future and adopted the "Pact for the Future" on Sunday 22nd September. This is a historic milestone as the Pact is the first international agreement aimed at securing a better digital future for all, grounded in human rights. The recent adoption of the "Pact for the Future" at the United Nations General Assembly marks a significant step toward revitalizing multilateral cooperation in an increasingly fragmented world. more
Despite global polarization, recent UN cyber diplomacy has achieved three significant agreements in 2024: a cyber attack reporting system, a convention against cybercrime, and a "Global Digital Compact." These successes show that consensus on global issues is possible, though the vague wording of agreements raises concerns about their long-term effectiveness in ensuring security and peace. more
In the fourth in this series of articles exploring how the application of appropriate tools, algorithms and analysis techniques can identify the existence of attractive, unregistered brandable domain names, I consider the prevalence of a few additional styles of name. more
A long-running issue resurfaced recently asking if light poles should be made available for telecommunications. This idea that light poles might be telecom infrastructure comes from language included in Section 224 of the United States Federal Communications Commission's (FCC) code that says that a "utility shall provide a cable television system or any telecommunications carrier with nondiscriminatory access to any pole, duct, conduit, or right-of-way owned or controlled by it." more
The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more
In a joint statement to the European Commission's new tech appointee, Henna Virkkunen, a coalition of internet advocacy groups has firmly opposed recent proposals aimed at imposing network fees on content providers. more
A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more
The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more
The shift from IPv4 to IPv6 has been a protracted and complex process, raising questions about why this transition has been so sluggish despite the depletion of IPv4 addresses more than a decade ago. more
After facing several regulatory obstacles, Elon Musk's Starlink is on the brink of entering the Indian market, a move that could reshape the country's digital landscape. more
Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more
A recent study conducted by Apple's artificial intelligence (AI) researchers has raised significant concerns about the reliability of large language models (LLMs) in mathematical reasoning tasks. Despite the impressive advancements made by models like OpenAI's GPT and Meta's LLaMA, the study reveals fundamental flaws in their ability to handle even basic arithmetic when faced with slight variations in the wording of questions. more
Ukrainian authorities have arrested a 28-year-old man in Khmelnytskyi for running an illicit virtual private network (VPN) service that enabled access to the Russian segment of the internet, known as Runet. more
The United Kingdom's recent decision to relinquish control over the Chagos Islands as part of a treaty with Mauritius has raised significant questions about the future of the popular .io domain. more
Following the devastating impact of Hurricane Helene on North Carolina, the U.S. Federal Communications Commission (FCC) has approved SpaceX's Starlink to provide direct-to-cell coverage in affected regions. more
NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more
Starlink, SpaceX's satellite-based internet service, has hit a major milestone by surpassing 4 million subscribers worldwide. SpaceX confirmed the news on Thursday after company President Gwynne Shotwell hinted earlier in the week that the service would reach the mark within days. more
Hawaiian Airlines has completed the installation of Starlink's high-speed satellite internet across its entire Airbus fleet, making it the first major U.S. carrier to offer free Wi-Fi powered by Starlink on transpacific flights. more
The NIS Cooperation Group has released critical guidance for the implementation of Article 28 under the NIS 2 Directive, focusing on registration data accuracy obligations for top-level domain (TLD) registries, registrars, and related services in the EU. more
Colombia has successfully defended itself against a $350 million lawsuit filed by U.S. company Vercara, formerly known as Neustar, in a legal battle over the management of the ".co" internet domain. more
A recent report from Specops Software reveals alarming security vulnerabilities within VPN password systems, highlighting over two million VPN passwords stolen by malware in the past year. more
Apple has reportedly removed nearly 60 VPN apps from its Russia App Store, significantly higher than the 25 VPNs acknowledged by Russian authorities, according to a recent report by the App Censorship Project. more
The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more
Efforts to curb illegal online content through domain shutdowns are proving ineffective and carry significant risks, according to a new report by eco and its topDNS initiative. more
The Biden administration is ramping up efforts to maintain U.S. leadership in artificial intelligence (AI) with a new initiative aimed at bolstering AI infrastructure while addressing national security and environmental concerns. more
Google Search is rolling out a new feature that allows users to access historical versions of websites directly through The Internet Archive's Wayback Machine. more
As of September 6, Brazilians caught using VPNs to access Elon Musk's social media platform X will face fines of up to 50,000 reais ($8,943.74) per day, despite false claims online suggesting otherwise. more
Russia's Ministry of Digital Development is set to invest nearly 60 billion rubles ($660 million) over the next five years to enhance its internet censorship system, according to a government proposal revealed by Reuters. more
The Malaysian government has backtracked on its recent decision to require Internet Service Providers (ISPs) to redirect Domain Name System (DNS) traffic away from third-party servers like Google Public DNS and Cloudflare. more
The Internet Society has appointed Sally Wentworth as its new President and CEO, effective September 1, 2024. Wentworth, who has been with the organization since 2009, previously served as Managing Director and Vice President of Policy, where she played a pivotal role in shaping global Internet policy. more
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
IPv4.Global, the world's largest, most trusted and transparent IPv4 marketplace, was awarded a Gold Globee for Company of the Year at the prestigious 14th Annual 2024 Globee® Business Awards, with judges lauding its new "innovative" audit tool. more
Toward the end of August 2024, a customized malware dubbed "Voldemort" based on strings found in its code was used in a cyber espionage campaign targeting various countries. more
At least 40 advanced persistent threat (APT) groups have trailed their sights on several European countries over the years, and that isn't surprising, given that the continent serves as the headquarters of renowned international organizations like the European Union Agency for Law Enforcement Cooperation (Europol), INTERPOL, and the North Atlantic Treaty Organization (NATO). more
Nearly 1 million individuals' information was stolen and exposed when threat actors launched a BlackSuit ransomware attack on 10 April 2024. The investigation revealed that the compromised data included the victims' Social Security numbers (SSNs), birthdays, and insurance claim information. more
We are excited to announce the annual .US Virtual Town Hall on Thursday, October 31, 2024, at 12 PM ET. This event, hosted by Registry Services, the usTLD Administrator, offers a unique opportunity to engage with key voices in the domain industry and contribute to the future direction of .US, America's official country code Top-Level Domain. more
Unstoppable Domains, a leading on-chain domain name provider and digital identity platform, today announces a significant partnership with Radix, a prominent registry of Top Level Domains (TLDs), to provide support for .pw domains and bridge the gap between traditional DNS and tokenized blockchain domains.
more
Remote access trojans (RATs) can be considered the malware of choice by the world's most notorious advanced persistent threat (APT) groups. And there's a good reason for that. They are hard to detect, making them ideal for lateral movement, and also difficult to get rid of. more
Namify AI, an upgraded AI-powered version of the established business name generator Namify, recently launched on Product Hunt and was named the #1 Product of the Day and #3 Product of the Week. more
Threat actors can often find targeting certain organizations too much of a challenge. So they need to go through what we can consider back channels -- suppliers, vendors, or service providers. more
While the usage of internationalized domain names (IDNs) has allowed organizations the world over to enter the global market using their native-language domain names, it can also enable cyber attackers to craft look-alikes of legitimate domains they wish to spoof. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more