Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The FCC Robocall Proceeding: International Insularity

In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more

Website Usage Analysis in the New gTLDs

A recent study, by EURid and the Leuven Statistics Research Centre, set out to better understand the most common usage of websites that are linked to domains, and we thought it would be an interesting exercise to extend similar analysis to the new gTLD market. So, we analyzed all second-level domains registered in new gTLDs according to published zone files on June 29, 2014.  more

The Privacy Party and Leaving Dishes in the Sink

Boy, that was a great party the White House threw yesterday when their new online privacy rights were unwrapped and passed around. Most everyone hefted their shiny new rights, agreed they were nice, and talked about the need for swift adoption. But when the party was done, everyone filed out, turning a blind eye to the post-party cleanup and a sink full of dirty dishes. more

New Book Released: International Domain Name Law, ICANN and the UDRP

A new book by David Lindsay, an academic at Monash University's Law School and a widely published expert on internet law, intellectual property law and privacy, has recently been published. ...In this path-breaking work the author examines the extent to which principles of national trade mark law have been used in UDRP decisions. It will be essential reading for anyone, whether academic or practitioner, interested in internet law, intellectual property, and e-commerce law. more

Judge Kocoras Cuts Down $11MM Award Against Spamhaus to $27,000 - e360 v. Spamhaus

e360 v. Spamhaus is one of these cases that's been around so long it feels like an old friend. A few years ago, e360 got some press for winning an eleven million dollar damage award against Spamhaus. In a less heralded development, following a bench trial on damages, last week a district judge modified e360's damage award down to only $27,000 on its tortious interference and defamation claims. more

Today’s Internet: More BRICS Than Westerners

Something over 55% of landline broadband users are in the "Global South," about 500M. The South is about 65% if you include "wireless-only" many of which are 4G LTE at ten megabits or more. The gap is widening rapidly and will increase by well over 70M in 2018. Six large developing countries are growing 5% or more in the last year, compared to only one in the developed world. China is adding ~30M more each year. Most developed countries are between 75% and 95% connected. That leaves little room for growth. more

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

.com Is A Clear and Present Danger to Online Safety

"The Internet is the real world now." This assessment was offered by Protocol, a technology industry news site, following the very real violence on Capitol Hill during the counting of the electoral college votes that officially determines the next president of the United States. The media outlet went on to say that, "[t]he only difference is, you can do more things and reach more people online -- with truth and with lies -- than you can in the real world." more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

The Draw: ICANN and a Severe Case of Virus Infection

I propose calling it Values Disorder Syndrome (VDS). It is a virus affecting groups of people. Though rational as individuals, sufferers acting in groups display an inexplicable addiction to the thrill of impunity. That behavior is totally irrational and unrelated to any perspective of gain or purpose... It is certainly a virus, and we know it goes around in ICANN circles. The proof is that the ICANN board has caught it. more

Why This Domain Expert Has Stopped Talking About Domain Names

I'm lucky enough to spend my working life helping some of the world's largest brands drive their .brand TLD projects. The excitement and the challenges of this space stem largely from the fact that this is a new innovation; and when you're working with something truly groundbreaking, naturally there's an element of "learning as you go." And I'm not afraid to admit, sometimes we get things wrong. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

UN and the Global Digital Compact: How to Strengthen the IGF?

According to UN Secretary-General Antonio Guterres, the forthcoming UN World Summit on the Future", scheduled for September 2024, should adopt a "Global Digital Compact" (GDC).1 The GDC is part of the so-called "UN Common Agenda." The compact is expected to "outline shared principles for an open, free and secure digital future for all" and to cover issues as digital connectivity, avoiding Internet fragmentation, providing people with options as to how their data is used... more

A Journey Into the Surreal: The GOP Protecting “Internet Freedom” With 25 Friends

Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days