U.S. Department of Homeland Security (DHS) and the FBI today released a technical alert based joint-effort analysis of methods behind North Korea’s cyberattacks. more
Microsoft has released security updates for close to a hundred security vulnerabilities in a number of Windows operating systems. more
A number of recent UDRP decisions remind trademark owners (and counsel) that cybersquatting cases have to be built from the ground up. Each stage has its evidentiary demands. The first two demand either/or proof; the third, the most demanding, requires proof of unified or conjunctive bad faith registration and bad faith use of the accused domain name. Priority, which intuitively would be thought a factor under the first stage (as it is under the ACPA) is actually a factor under the third stage. more
"Voter databases and software systems in an overwhelming number of states -- 39 to be exact -- were targeted by Russian cyberattacks over the summer and fall of 2016," Allegra Kirkland reporting today in TPM more
Trump has a dilemma. He has to take some executive action that will allow him to ridicule President Obama and show that he is punishing Cuba for its human rights violations and the confiscation of businesses and property after the revolution, but not harm US telephone companies, hotel chains, airlines and cruise lines. Trump is expected to announce his Cuba policy next Friday in Miami. There can be little doubt that he will reverse some of President Obama's executive orders... more
Deema Tamimi had one plan for the 2016 California Apps for Ag hackathon: get in and get out. She thought the weekend-long event would be a good opportunity to meet people, but she didn't feel ready to launch a new app, and so she planned on stealing away soon after the hackathon began. This, despite the very impressive resume she'd accrued and the fully-formed idea for a gardening-based app that had been brimming for half a year. But something magical can happen when so many engineers, experts, change-makers, and creatives converge at a hackathon. more
The Canadian Internet Registration Authority (CIRA) has announced the launch of a security service called D-Zone DNS Firewall -- a cloud-based cybersecurity solution -- to protect Canadian organizations from rasomware and malware. more
The websites and digital platforms of Qatar-based Al Jazeera Media Network are undergoing systematic and continual hacking attempts, the news agency reported a few hours ago on its website. more
NTIA issued a Request for Comments today asking for broad input from "all interested stakeholders, including private industry, academia, civil society, and other security experts," on actions against botnets and distributed attacks. more
As we increasingly move towards an IoT world, vendors of safety-critical devices will be patching their systems just as regularly as phone and computer vendors do now. Researchers warn that many regulators who previously thought only in terms of safety will have to start thinking of security as well. more
The White House has expressed its full support on the need for permanent reauthorization of Section 702, created "to address an intelligence-collection gap that resulted from the evolution of technology in the years after FISA became law in 1978." more
What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future? As part of the Internet Society's "Internet Futures" project, we'd like your input on recommendations for Internet leaders and policy makers. For more background, please read "Help Shape the Future of the Internet" by my colleague Constance Bommelaer, or browse through the Internet Futures pages. more
Efforts to combat cybersquatting began in earnest in 1998 when the World Intellectual Property Organization (WIPO) (at the request of the United States Government supported by all member states) began an extensive process of international consultations "to address cross-border trademark-abusive domain name registrations." ... The extensive process concluded in the Spring of 1999 with WIPO publishing a detailed report... more
Russia's military intelligence agency launched a cyberattack just days before Election Day 2016 on a U.S. software supplier that provides voting services and systems, according to a top secret report posted Monday by The Intercept. more
On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five years. In mid-2012, Google measured less than 1% of users accessing their services over IPv6. Today that figure is getting close to 20%. Since World IPv6 Launch, several major operators are now delivering the majority of traffic from major content sources like Google, Akamai and others over IPv6. more