Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Domain Name Proxy Service Not Inherently Evil

In the recent court decision of CyBerCorp Holding v. Allman case, although the registrant of the domain name 'cybertraderlive.com' did lose the Uniform Domain Name Dispute Resolution Policy (UDRP) case and was found to have acted in bad faith (having been a former customer of complainant), the decision is noteworthy as it finds that registrant's use of proxy service to keep contact information private, in and of itself is not evidence of bad faith... more

Microsoft Choking Domain Parking Business Practices?

In a follow up to Microsoft's Strider URL Tracer tool released a few months ago, SecurityFocus is running an article which takes a closer look at how Microsoft's free Strider URL Tracer with Typo-Patrol is aimed at fighting typo-squatters and domain parking abuse. From the article: "In most cases, the typo domain is not even selling a product or service itself. The typo domain makes its money from syndicated advertising such as Google's AdSense program. The typo-squatter simply parks the domain and the only content on the site ends up being the ads served from a syndicated advertising program..." more

The Non-Parity of the UDRP

The UDRP is obviously not working. Two websites, fundamentally the same (criticism at trademark.tld), two opposite decisions, both within weeks of each other! A Complainant (Biocryst Pharmaceuticals Inc) initiated a complaint to WIPO about one of my criticism websites (biocrystpharmaceuticals.com). The Panel found in my favour. Another Complainant (Eastman Chemical Inc) meanwhile made a complaint to NAF regarding another of my criticism websites (eastman-chemical.com). The Panel found against me. The two websites are fundamentally the same, both websites in criticism of the practices of the individual companies concerned... more

Cornucopia: A Radically Different Approach to TLDs

Much of the discussion about proposed TLDs centres around domain names as a form of classification: ".mobi" for mobile device content, ".kids" for child-safe content, language codes for language-specific content, ".museum" for museum-related entities, and so on. Notoriously little activity has been forthcoming in actually implementing these proposals, and the select few that have been allowed out into the world are, shall we say, a tad arbitrary. I'd like to engage in a little thought experiment where we abandon the "few TLDs with carefully chosen meanings" paradigm, and instead consider the benefits of a cornucopia of completely meaningless TLDs. more

DNSSEC: Will Microsoft Have Enough Time?

I have previously pointed out the shortcomings of good and user friendly support for DNSSEC in Microsoft's Server 2008 R2. During the period just after I wrote the post, I had a dialogue with Microsoft, but during the last months there has been no word at all. The reason I bring this up again is that more and more Top Level Domains (TLDs) now enable DNSSEC and also the fact that within six months the root will be signed. more

3rd Lawsuit Against VeriSign; Seeks Class Action Status

A third lawsuit has been filed late Friday in a federal district court in California against VeriSign, Inc. over its controversial DNS wildcard redirection service known as SiteFinder. It was filed by the longtime Internet litigator Ira Rothken. In addition, while two other lawsuits have been filed by Go Daddy Software, Inc. and Popular Enterprises, LLC. in Arizona and Florida, this is the first lawsuit to seek class-action status. Here is an excerpt from the "Introduction" section of this class-action lawsuit... more

IPv6 Security Myth #5: Privacy Addresses Fix Everything!

Internet Protocol addresses fill two unique roles. They are both identifiers and locators. They both tell us which interface is which (identity) and tell us how to find that interface (location), through routing. In the last myth, about network scanning, we focused mainly on threats to IPv6 addresses as locators. That is, how to locate IPv6 nodes for exploitation. Today's myth also deals with IPv6 addresses as identifiers. more

Multistakeholderism Is Working: Even in Exile

I'm happy to report (mostly) positive feedback on my last article that examined how the multistakeholder model tackled, and tackled well, Phase 1 of the review of all Rights Protection Mechanisms. While bad news may sell more clicks, a little good news from time to time also appears to be welcome. Good news also reminds us of how fortunate we are to have a private sector ICANN with a multistakeholder model of policy development... more

Domain Name System (DNS) Security Should Be One of Your Priorities

Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more

The Future of the Internet: A Political View

Lets face it, gathering a collection of ministerial delegations to laboriously recite prepared speeches to each other sounds about as exciting as watching paint dry. And observing meetings where the major outcome appears to be limited to the scheduling of the next meeting can become somewhat tedious after a while. It should not be surprising that the level of expectation of tangible outcomes for such governmental meetings is invariably abysmally low. So what's the value of adding yet another meeting to governments' schedule? What makes the OECD-hosted ministerial meeting on the Future of the Internet Economy so unique in the context of the Internet's current political landscape and its political future? Why would a meeting about the dismal science of economics hold any interest at all? more

The Coding of Online Brand Protection

Moore's law postulates that the number of transistors in an integrated circuit will double every two years. That law has given us smartphones and other devices with astonishingly diverse capabilities at ever lower costs. However, while it does not encompass online brand infringement, many trademark managers feel that their task is likewise expanding at exponential speed and imposing escalating costs. Potential cybersquatting based in the more than one thousand new generic top level domains is only one new source of anxiety. While the jury is still out on the level of harmful cybersquatting and the efficacy of the new Rights Protection Mechanisms (RPMs) for new gTLDs, that ICANN program is hardly the only challenge. more

Let’s Have an Honest Conversation About Huawei

On May 29, I attended an AEI event on "International economics and securing next-generation 5G wireless networks," with Ambassador Robert Strayer, who heads the U.S. State Department's CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications vendor Huawei – another episode in an ongoing U.S. government campaign to shut Huawei and other Chinese firms out of the U.S. market, and to convince every other country in the world to do the same. more

Study Finds Spammers Use P2P Harvesting to Spam Millions

A recent study conducted by Blue Security reports how Internet users can unknowingly expose their contacts' emails addresses to Spammers while sharing files, music, games and DVDs over Peer-to-Peer (P2P) networks. The study has uncovered hundreds of incidents where files containing email addresses were made accessible in P2P networks. more

Transition to IPv6 Address

Last month's column looked at the exhaustion of the IPv4 unallocated address pool and the state of preparedness in the Internet to grapple with this issue... There has been a considerable volume of discussion in various IPv6 and address policy forums across the world about how we should respond to this situation in terms of development of address distribution policies. Is it possible to devise address management policies that might both lessen some of the more harmful potential impacts of this forthcoming hiatus in IPv4 address supply, and also provide some impetus to industry to move in the originally intended direction to transition into an IPv6 network? more

ICANN Starts IPv6 Ball Rolling

IPv6 took a significant step forward this week with ICANN's decision to officially add the next generation protocol to its root server systems. The shift to IPv6 is perhaps the largest and most significant change to the structure of the Internet in decades - ICANN's move a signal that the revolution has officially begun. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days