Cybercrime

Cybercrime / Most Viewed

CENTR Has Released an Animated Video on ccTLDs and Their Technical Role Concerning Content

Due to increased legislative interest in this topic, CENTR says there is a pressing need for comprehensive educational material on the technical capabilities of the DNS, ccTLDs and their role in the internet ecosystem. more

Call for Domain Owner Code of Rights and Responsibilities

This article discusses grassroots progress toward the development of a "Domain Registrant's Code of Rights and Responsibilities." This Code is an effort to create a balanced combination of the rights that domain name registrants should enjoy and the responsibilities that domain name registrants should fulfill. Discussion and survey results concerning this Code at domain-related forums show far greater grassroots consensus than one might think between what might be called the "domainer" and "intellectual property" communities. Informal surveys at some domain-related forums show very strong support in favor of this Code. more

Hot Legal Action in Canada!

The best part is ... this isn't one of those 'now that I've got your attention' tricks, like one of those old "free beer" posters; there really is a ton of stuff happening above the 49th parallel this summer. To begin with, as a precursor to Canada's Anti-spam Law coming into effect later this year, the Office of the Privacy Commissioner, the Canadian Radio-television Telecommunications Commission, and Industry Canada have all issued regulations, the latter two in draft form with an RFC. more

Last Decade in Spam

CAUCE, the Coalition Against Unsolicited Commercial Email, has looked back at the notable events of the last decade in our industry. Each year/link in the post explodes to a discrete blog entry with a month-by-month break-out of notable events. more

A Few Thoughts on the Future of Email Authentication

With the Online Trust Alliance Town Hall Meeting and Email Authentication Roundtable next week as well as the RSA Conference, I decided to pause and think about where we are and where we might be headed with regard to email authentication. Over the years, many of us have collectively worked to provide a framework for authenticating email... more

New Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT Application Security

Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today from Ponemon Institute, IBM Security, and Arxan Technologies. more

Internet Governance and the Universal Declaration of Human Rights, Part 6: Articles 18-19

Internet Governance, like all governance, needs guiding principles from which policy making, and acceptable behavior, are derived. Identifying the fundamental principles to guide Internet ecosystem policy making around digital citizenship, and around the integrity of digital practices and behavior, can and should start with the Universal Declaration of Human Rights, (UDHR). more

WHOIS Review and Beyond 3.7.8

We have posted our support of the WHOIS Policy Review Team Report with two important comments. First, on page 79 of the report it is confirmed that the RAA is unenforceable on WHOIS inaccuracy (we wrote about this while at the last ICANN meeting) because the language of RAA 3.7.8 has no enforcement provision. It is now time for ICANN to confirm this problem officially.  more

Did Navigation Catalyst Systems Get Off Easy in Verizon’s $100 Million Plus Lawsuit?

Navigation Catalyst Systems (NCS) has settled the well publicized cybersquatting lawsuit brought against it by Verizon. The terms of the settlement are simple and straight forward, amounting to little more than an agreement by NCS to no longer register domains similar to Verizon's trademarks again. No money was apparently paid by NCS as part of the resolution. more

Breaking the Internet HOWTO: The Unintended Consequences of Governmental Actions

"Breaking the Internet" is really hard to do. The network of networks is decentralized, resilient and has no Single Point Of Failure. That was the paradigm of the first few decades of Internet history, and most people involved in Internet Governance still carry that model around in their heads. Unfortunately, that is changing and changing rapidly due to misguided government intervention. more

Are Botnets Run by Spy Agencies?

A recent story today about discussions for an official defense Botnet in the USA prompted me to post a question I've been asking for the last year. Are some of the world's botnets secretly run by intelligence agencies, and if not, why not? Some estimates suggest that up to 1/3 of PCs are secretly part of a botnet. The main use of botnets is sending spam, but they are also used for DDOS extortion attacks and presumably other nasty things like identity theft. But consider this... more

Internet Management and National Security: Time for a Federal Action Plan

Former CIA Director George Tenet recently gave a speech highlighting the need for federal action on internet management in order to protect national security. As reported by the online edition of Government Executive, Mr. Tenet explained that, "greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks." more

UDRP Good for Trademark Protection, Not So Good for Political Process

Social Science Research Network has published a paper examining "the large gaps and inconsistencies in current domain name law and policy" as compared with domain name use in the political context. The paper suggests that the current domain name policy is focused on protecting trademark uses of domain names against bad faith commercial 'cybersquatters' but does not deal with protecting use of domain names as part of the political process. more

South Korean Banks Receive DDoS Threat from Hacker Group, Record Ransomware Payment Demanded

Various sources including South Korea's news agency Yonhap are reporting that a hacker group has threatened to launch a DDoS attack against seven South Korean banks unless they pay about 360 million won (US$315,000) in bitcoin. more

Epsilon Interactive Breach the Fukushima of the Email Industry

A series of attacks on the Email Service Provider (ESP) community began in late 2009. The criminals spear-phish their way into these companies that provide out-sourced mailing infrastructure to their clients, who are companies of all types and sizes. ... On March 30, the Epsilon Interactive division of Alliance Data Marketing (ADS on NASDAQ) suffered a massive breach that upped the ante, substantially. Email lists of at least eight financial institutions were stolen. more