Cybercrime

Cybercrime / Most Viewed

Canadian Internet Registration Authority Launches Cloud-Based DNS Firewall Service

The Canadian Internet Registration Authority (CIRA) has announced the launch of a security service called D-Zone DNS Firewall -- a cloud-based cybersecurity solution -- to protect Canadian organizations from rasomware and malware. more

12 Common Mistakes Made By Bad Faith Cybersquatters

Some cybersquatters register domains in bad faith as part of a business plan to monetize domains by leveraging famous trademarks and high-traffic web sites. Some cybersquatters just don't understand the law. In this this tongue-in-cheek post, we provide a real world case study of the most common mistakes made by cybersquatters when registering trademark protected domains in bad faith. more

EURid Suspends More Domains

EURid, the entity charged with managing the .eu namespace, is reported to have taken action against an alleged cybersquatter based in China, Zheng Qingying... The last suspension "en masse" was directed against Ovidio when over 74 thousand domains were suspended. This time round the number is much lower -- a paltry ten thousand! In this instance there seems to have been a pattern of cybersquatting, with over a dozen ADR proceedings against the registrant in question. more

Microsoft Files Three More Cybersquatting Cases

Microsoft has filed 3 cybersquatting cases at the beginning of September 2007, as reported in an Inside Indiana Business article. I took the liberty of accessing the cases via the PACER system, and posted the major documents... It looks like they're stepping up efforts to defend their trademarks, and seeking big damages in court, rather than go the way of the UDRP. These cases demonstrate that new TLDs should not be a priority with ICANN until the problems in existing TLDs are addressed. more

Frequency of DDoS Attacks Risen by 40% While Duration of Attacks Decrease

The frequency of DDoS attacks has risen by 40% year on year while the duration of attacks decreased with 77% lasting ten minutes or less, according to a new report released by Corero Network Security. more

Why DNS is Broken, in Plain English

At ICANN's meeting in Egypt last week, I had the opportunity to try and explain to various non-technical audiences why the Domain Name System (DNS) is vulnerable to attack, and why that is important, without needing a computer science degree to understand it. Here is the summary. more

“Internet Drivers License” - A Short History Lesson

The press, the blogosphere, CircleID - everybody has been discussing Craig Mundie's comment on the need for an "Internet Driver's License". Most of the reaction has been from privacy advocates fearing that this is simply another way to kill anonymity on the Internet. Oh well... that's the usual set of reactions. Now... the fun part is, a driver's license also shows that you have the competence to drive... more

Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats

You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don't remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you're reading this. more

MIT 2010 Spam Conference Starts Tomorrow…

In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more

Internet: Government Dominance or Governance?

In an age where the world has gone global in many forms and guises, the political attention is more and more focussed on national, populist issues, that arise from fear for the unknown. I can't deny it: the future undoubtedly contains many uncertainties. This usually comes with a general public that's afraid and in fear of things they cannot oversee. Thus it is easily aroused by a populist leader who feeds on this fear and throws flammable material on the already smouldering fire. In a time where leadership is called for, it seems lacking. The Internet governance discussion demands visionary leadership on a cross border level and it needs it soon. more

The Importance of IP Resource Planning in Government ICT Strategic Plans

It seems everywhere I turn, there's someone throwing around statistics for how the Internet and broadband will drive economic growth, create jobs, end world hunger and bring world peace (ok, maybe not the later). Sure enough, government officials are buying into that rhetoric and extending it in initiatives like national broadband strategies, cybercrime and cybersecurity plans as well as e-governance strategies. more

The EARN IT Act: The Wrong Solution to a Complex Problem

The EARN IT Act was reintroduced into Congress last Monday, with the promise that it would end Internet platforms' "blanket immunity" for "tens of millions of photos and videos" of child sexual abuse that they allow to circulate online. With the bill already scheduled for hearing in committee, it's on track to be passed quickly. And why shouldn't it be, if its sponsors' claims about it are true? Perhaps because they're not true. more

U.N. Approves Resolution to Combat Cybercrime Despite Opposition From E.U., the U.S. and Others

The U.N. General Assembly has approved a resolution to start the process of drafting a new international treaty against cybercrime despite objections from the European Union, the United States and other countries. The Russian-drafted resolution received approval from a 193-member world body with a vote of 79-60 and 33 abstentions. more

Equifax Breach Blamed on Open-Source Software Flaw

Equifax has blamed a flaw in the software running its online databases for the massive breach revealed last week that has allowed hackers to steal personal information of as many as 143 million customers. more

Smart Phishing for Smartphones

A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more