In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
The Summit of the Future (SotF) was held at the United Nations Headquarters in New York on September 22 -- 23, 2024. World leaders, in the presence of stakeholders from the private sector, civil society, academic/technical communities, and youths, endorsed a landmark Pact for the Future of mankind. The Pact for the Future (P4F) (A/RES/79/1) was a significant, consensus-driven but non-binding document agreed upon by world leaders specifically on September 22, 2024. more
In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'... more
Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low). more
As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more
Global leaders gathered in New York at the Summit of the Future and adopted the "Pact for the Future" on Sunday 22nd September. This is a historic milestone as the Pact is the first international agreement aimed at securing a better digital future for all, grounded in human rights. The recent adoption of the "Pact for the Future" at the United Nations General Assembly marks a significant step toward revitalizing multilateral cooperation in an increasingly fragmented world. more
Despite global polarization, recent UN cyber diplomacy has achieved three significant agreements in 2024: a cyber attack reporting system, a convention against cybercrime, and a "Global Digital Compact." These successes show that consensus on global issues is possible, though the vague wording of agreements raises concerns about their long-term effectiveness in ensuring security and peace. more
In the fourth in this series of articles exploring how the application of appropriate tools, algorithms and analysis techniques can identify the existence of attractive, unregistered brandable domain names, I consider the prevalence of a few additional styles of name. more
A long-running issue resurfaced recently asking if light poles should be made available for telecommunications. This idea that light poles might be telecom infrastructure comes from language included in Section 224 of the United States Federal Communications Commission's (FCC) code that says that a "utility shall provide a cable television system or any telecommunications carrier with nondiscriminatory access to any pole, duct, conduit, or right-of-way owned or controlled by it." more
The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more
At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet. more
SpaceX first departed from its uniform Starlink pricing policy when it offered a reduced price for throttled service in France two years ago. Since then, many new, higher-capacity satellites have been launched, enabling SpaceX to reduce prices in low and middle-income countries like Kenya. Kenya had 405 geostationary satellite internet subscribers when Starlink became available in July 2023. more
My previous article on brandable domain names1 -- that is, available (unregistered) domain names which may be appealing to any entity looking to identify a potential name for a new brand launch -- focused on the use of phonotactic (i.e. 'readability') analysis techniques to identify candidate names. more
In a world where the internet is central to communication, innovation, and economic growth, governing this vast digital ecosystem is a complex challenge. The multi-stakeholder approach, which involves governments, private entities, civil society, technical experts, and end-users, has long served as the cornerstone of Internet governance, ensuring that decision-making remains open and inclusive. more
Five years ago, any discussion of 5G included a vision that we'd end up with smart cars that were all connected with a ubiquitous 5G network that was going to be built everywhere. We're still waiting to see a real 5G network anywhere instead of the 4G LTE networks that are still being touted by every cellular company as 5G. The idea of a ubiquitous network capable of supporting smart cars died, but there is still an effort underway to use wireless technology to make car travel safer. more
The Internet Archive's Controlled Digital Lending (CDL) lends out scans of physical books, ensuring that each scan is lent to one person at a time. Publishers sued, and the Archive lost thoroughly in April 2023. The Archive appealed the decision to the Second Circuit court in New York. As I said at the time, the appeal seemed like a long shot since that is the same court that said that Google Books was OK, mostly because it didn't provide full copies of the books. more
Over the past twenty years of my engagement in the ICANN multistakeholder process, one topic that has always been near and dear to me has been improving the accuracy and access to domain name registration data in a way that respects the legal rights of both registrants and requestors of registration data. Sadly, the glacial pace at which ICANN develops and implements policy has prevented a holistic solution to the problem. more
If you operate an Internet Exchange Point (IXP) or are interested in creating one, the Internet Society has a “Sustainable Peering Infrastructure” funding program that is open for applications until this Friday, September 6, 2024... Grant funds from USD $5,000 up to $50,000 are open to all regions and are available to assist in equipment purchases (switches, optic modules, servers, and routers), training, capacity building, and community development. more
Conventional wisdom within the domain-sales industry states that the stock of unregistered domain names is 'running out,' with limited or no availability of short, desirable domain names across popular extensions (TLDs). This presents problems for would-be brand owners looking for a brand name (and accompanying suitable website presence) to utilize for newly-launched companies... more
AI is bringing changes to the domain registration process by enhancing user experience, improving registrar operations, and empowering registries. In recent years, AI has entered the industry via the huge growth of new website builders. Today, new developments in the field offer an opportunity to align the interests of all stakeholders, from end user to registry. more
NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more
Starlink, SpaceX's satellite-based internet service, has hit a major milestone by surpassing 4 million subscribers worldwide. SpaceX confirmed the news on Thursday after company President Gwynne Shotwell hinted earlier in the week that the service would reach the mark within days. more
Hawaiian Airlines has completed the installation of Starlink's high-speed satellite internet across its entire Airbus fleet, making it the first major U.S. carrier to offer free Wi-Fi powered by Starlink on transpacific flights. more
The NIS Cooperation Group has released critical guidance for the implementation of Article 28 under the NIS 2 Directive, focusing on registration data accuracy obligations for top-level domain (TLD) registries, registrars, and related services in the EU. more
Colombia has successfully defended itself against a $350 million lawsuit filed by U.S. company Vercara, formerly known as Neustar, in a legal battle over the management of the ".co" internet domain. more
A recent report from Specops Software reveals alarming security vulnerabilities within VPN password systems, highlighting over two million VPN passwords stolen by malware in the past year. more
Apple has reportedly removed nearly 60 VPN apps from its Russia App Store, significantly higher than the 25 VPNs acknowledged by Russian authorities, according to a recent report by the App Censorship Project. more
The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more
Efforts to curb illegal online content through domain shutdowns are proving ineffective and carry significant risks, according to a new report by eco and its topDNS initiative. more
The Biden administration is ramping up efforts to maintain U.S. leadership in artificial intelligence (AI) with a new initiative aimed at bolstering AI infrastructure while addressing national security and environmental concerns. more
Google Search is rolling out a new feature that allows users to access historical versions of websites directly through The Internet Archive's Wayback Machine. more
As of September 6, Brazilians caught using VPNs to access Elon Musk's social media platform X will face fines of up to 50,000 reais ($8,943.74) per day, despite false claims online suggesting otherwise. more
Russia's Ministry of Digital Development is set to invest nearly 60 billion rubles ($660 million) over the next five years to enhance its internet censorship system, according to a government proposal revealed by Reuters. more
The Malaysian government has backtracked on its recent decision to require Internet Service Providers (ISPs) to redirect Domain Name System (DNS) traffic away from third-party servers like Google Public DNS and Cloudflare. more
The Internet Society has appointed Sally Wentworth as its new President and CEO, effective September 1, 2024. Wentworth, who has been with the organization since 2009, previously served as Managing Director and Vice President of Policy, where she played a pivotal role in shaping global Internet policy. more
German companies have suffered substantial financial losses due to cybercrime and sabotage, totaling approximately €267 billion ($298 billion) over the past year. This represents a 29% increase compared to the previous year, according to a survey released on Wednesday by the industry association Bitkom. more
In a groundbreaking development for quantum communication, researchers at Qunnect Inc. have successfully achieved the automated distribution of polarization-entangled photons over New York City's existing fiber network. more
This open-source initiative is designed to systematically gather and analyze data on new domain registrations, with the goal of enhancing transparency and fostering innovation across the European domain landscape. more
This accreditation positions UD as the largest ICANN-accredited registrar in the Web3 space, allowing it to expand its offerings to include a broader range of generic top-level domains (gTLDs) and country code domains (ccTLDs). more
The Internet Corporation for Assigned Names and Numbers (ICANN) has officially reserved the top-level domain ".INTERNAL" for private-use applications. This decision follows years of technical evaluations, public consultations, and inter-organizational discussions. more
A Chinese state-backed company has successfully launched its first 18 satellites, marking the initial phase of a significant project to establish a vast orbital network intended to compete with Starlink, according to The China Securities Journal. more
Malaysia is advancing legislation for an internet “kill switch” aimed at curbing online abuse and illegal activities. This initiative, spearheaded by the country’s Law and Institutional Reform Minister Azalina Othman Said, seeks to hold social media and messaging platforms accountable for content disseminated through their services. more
The Chinese government is considering a new system allowing citizens to use cyberspace IDs instead of providing personal information to internet service providers. more
A recent report has revealed an alarming trend in ransomware attacks and a staggering $75 million ransom payout. The report by Zscaler ThreatLabz team indicates a 17.8% increase in ransomware attacks. more
Bangladesh is experiencing a complete internet shutdown and severe mobile service disruptions due to escalating student protests that began earlier this week. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC
Remote access trojans (RATs) can be considered the malware of choice by the world's most notorious advanced persistent threat (APT) groups. And there's a good reason for that. They are hard to detect, making them ideal for lateral movement, and also difficult to get rid of. more
Namify AI, an upgraded AI-powered version of the established business name generator Namify, recently launched on Product Hunt and was named the #1 Product of the Day and #3 Product of the Week. more
Threat actors can often find targeting certain organizations too much of a challenge. So they need to go through what we can consider back channels -- suppliers, vendors, or service providers. more
While the usage of internationalized domain names (IDNs) has allowed organizations the world over to enter the global market using their native-language domain names, it can also enable cyber attackers to craft look-alikes of legitimate domains they wish to spoof. more
The ReasonLabs Research Team uncovered a new widespread polymorphic malware campaign that forcefully installed extensions on users' systems. more
Satori recently published a report on a massive fraud campaign they have dubbed "Konfety" (Russian word for "candy"). Sounds sweet, right? more
Radix has set a new benchmark in its premium domains segment for the first half of 2024, reporting a record $5.16 million in retail revenue. more
As if the attention surrounding the upcoming U.S. presidential elections is not enough, the WhoisXML API research team may have unveiled thousands of potential sources of disarray -- election-related cybersquatting domains. These domains may be a lucrative source of income for some people. Case in point? more
Fortinet recently discovered a Meduza Stealer variant that has been taking advantage of the Microsoft Windows SmartScreen vulnerability CVE-2024-21412. The Meduza stealer lets remote attackers bypass the SmartScreen security warning dialog to deliver malicious files. more
The WhoisXML API research team analyzed more than 7.3 million domains registered between 1 and 31 July 2024 in this post to identify five of the most popular registrars, top-level domain (TLD) extensions, and other global domain registration trends. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more
VPNs can disconnect due to unstable internet connections, server overloads, incorrect settings, outdated software, or interference from firewalls and antivirus programs. Switching servers, checking network stability, updating VPN software, and adjusting firewall settings often help resolve the issue. more
A VPN won't protect you from malware, phishing attacks, or vulnerabilities in the websites you visit. It also can't prevent tracking through cookies, protect against weak passwords, or safeguard against legal issues if you're doing something illegal. It primarily secures your connection, not your overall online behavior. more