If you haven't noticed lately, spam levels around the world have started dropping especially in October after a couple of events occurred. The first is a Russian crackdown on alleged spam king Igor Gusev, thought to be involved in the operations of SpamIt.com. SpamIt mysteriously shut down in late September, perhaps because Gusev caught wind of law enforcement starting to take notice of him. more
In an article published by the Technology Liberation Front, Cato Institute adjunct scholar Tim Lee dissects a recent argument by the American Civil Liberties Union (ACLU) regarding free speech & anti-spam laws. It's been interesting to watch the ACLU wrestle with anti-spam legislation. Their entire purpose is to work through the legal system to protect our civil rights, as defined in the First Amendment -- which is why I've been a card-carrying member since before I was old enough to vote... more
As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more
The Stop Online Piracy Act (SOPA) and its defeat call attention to a delicious irony in public discourse on Internet governance. Even those who don't want the Internet to be an exception from traditional forms of regulation and law are forced to admit that something new and exceptional must be done to bring it under control, such as massive departures from traditional concepts of territorially bounded sovereignty through the use of in rem jurisdiction. more
A Forever URL is one that never expires. You own it and needn't worry about forgetting to renew it. The term itself is inspired by the US Forever Stamps, which you can use even if the postal rate goes up. This article looks at the underlying mechanisms for linking such information and is aimed at a technical audience. The DNS isn't just about websites; it is fundamental to how we connect endpoints, be they websites, devices, documents etc. more
People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more
This morning, the US House Subcommittee on Intellectual Property, Competition and the Internet led by Representative Goodlatte (R - VA) conducted a hearing on New gTLDs. Kurt Pritz, Senior Vice President from ICANN did his best to alleviate concerns about the risks posed to intellectual property rights and consumers as the result of the New gTLD Program and reiterated that the process to launch new gTLDs has been underway for 7 years. more
My third installment regarding gTLD objections - and understanding exactly what's required for an objector to prevail - moves to the more complex community-based objections. For those getting their first exposure to this unwieldy beast, pull up a chair and get comfortable. The community objection involves multifaceted elements, each having its own set of defining factors and often using similar terminology in different contexts. As such, it can be very confusing and one can easily lose track of the bigger picture. more
Over the last couple of years, the networking industry has grown aware of the various security issues that could potentially have a huge impact on their operations. One of the topics that has raised in appeal is DNS security. Considering that much of the publicity around DNS is made by vendors trying to differentiate their solutions, there are many misconceptions out there that guide people into making poor investment in their infrastructure. more
One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more
Phishing blindsides businesses' best defenses and takes a toll whose price tag still hasn't been pinned down. Here's one estimate: $441 million per attack, according to a recent study of the cybercrime's effect on stock market data (market value, volume of shares traded, and stock volatility) of global firms. The authors use "event studies" techniques (i.e., analyzing the impact of specific types of events on companies' market performance) to analyze nearly 2,000 phishing alerts by 259 companies in 32 countries... more
In spite of having a slow, expensive, government-controlled Internet infrastructure, Cuba is undergoing what Ted Henken and Sara Garcia Santamaria refer to as a digital revolution. The digital revolution might be said to have begun in 2007 when Yoani Sánchez launched her blog "Generation Y." Internet access was difficult -- she would get illegal connectivity at tourist hotels, and the blog was initially hosted in Germany. Soon, the Huffington Post began publishing her posts, and she has subsequently received many international awards, including the Ortega y Gasset Award for Digital Journalism in 2008. more
When I first entered the domain industry as head of finance and operations at .MOBI, the company had just acquired its licence from ICANN. I did a quick overview of the business environment through a financial lens. My first impressions were predominantly positive. Sales were generated up front on a cash basis, which put registry operators in an enviable operational cash flow position... Outsourcing the back-end registry operations meant that we could tie cost of goods sold (COGS) to activity. But I had a steep learning curve... more
As many in the ICANN community prepare to depart for the sunny beaches of Cancun, Mexico, it appears the ICANN 76 meeting could be significant when it comes to the long-awaited next application window for gTLDs. It's been over 11 years since applicants were last able to apply for a gTLD (and some of those strings are still launching into the marketplace all these years later), and the community work to review that initial process has never really stopped. more
In February 2012, Neustar surveyed IT professionals across North America to better understand their DDoS experiences. Most were network services managers, senior systems engineers, systems administrators and directors of IT operations. In all, 1,000 people from 26 different industries shared responses about attacks, defenses, ongoing concerns, risks and financial losses. more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign