/ Most Viewed

An Internet Security Operations Viewpoint of IGF

The Internet Governance Forum (IGF) is an annual UN conference on Internet governance which was held this year in Rio de Janeiro, Brazil. The topics discussed range from human rights online to providing Internet access in developing countries. A somewhat secondary topic of conversation is Internet security and cyber-crime mostly limited to policy and legislative efforts. Techies and Internet security industry don't have much to do there, but I have a few updates for us from the conference. more

Africa’s Digital Darkness: Internet Shutdowns Reach Record High

Governments across Africa increasingly wield internet blackouts as a tool to suppress dissent, with 2024 marking a record high for digital censorship. According to a report by Access Now and #KeepItOn, 21 internet shutdowns were recorded across 15 African nations, surpassing previous highs in 2020 and 2021. more

Nom-Com Appoints Independent and Diverse Candidates to ICANN Leadership Positions

When 72 candidates vie for 8 positions, making tough choices are inevitable. ICANN's 2005 Nominating Committee (Nom-Com) on Friday announced the selection of a diverse and independent set of nominees for important roles in ICANN, including the Board of Directors, the Generic Names Supporting Organization (GNSO), the At-Large Advisory Council (ALAC) and the Country Code Names Supporting Organization (ccNSO). more

Domain Registrations in New TLDs Overwhelmingly for Defensive Purposes, INTA Study

During the ICANN meeting in South Africa last week, the impact of new gTLD rights protection mechanisms (RPMS) was the subject of key discussions, and some concerns were voiced regarding trademark owners themselves registering domain names excessively and technically abusing the sunrise period. more

WHOIS Record Redaction and GDPR: What’s the Evolution Post-2018?

We all use the Internet daily. Practically every element of our reality has its equal in the virtual realm. Friends turn into social media contacts, retail establishments to e-commerce shops, and so on. We can't deny that the way the Internet was designed, to what it has become, differs much. One example that we'll tackle in this post is the seeming loss of connection between domains and their distinguishable owners. more

Can We Get More Eyes on Britain’s Largest Scam “Watch List”?

The FCA has been naming and shaming financial scam domains for decades. Its "warning list" is probably one the most extensive databases of its kind. But does it do a good enough job of actually warning people? Let us begin with the FCA website, which would not exactly get full points for user-friendliness: locating the "watch list" is a task in and of itself, to say nothing of consulting and scrutinising it. more

CMO Offers Fresh View on New gTLDs: “They’re a Channel, Not Just a Label”

Several years ago, I had a very interesting conversation with a talented marketing executive from Portland, Oregon who joined the DotGreen Community, Inc. Board of Directors. When I told him about the new gTLD program, which was then under development at ICANN, Dave Maddocks immediately understood the value of what new gTLDs would mean to all businesses that have an online location. more

Canada: Smart Regulation, Not De-regulation

Canada's CRTC isn't as dumb as U.S. regulators who are considering ruling that the law doesn't apply where the telcos oppose it. (Title II deregulation) Canada just decided wireless needs to follow the rules. In turn, the CRTC intends to make sure the rules are reasonable. Rather than saying "never any rules," they instead try to write sensible ones. more

New TLDs For Dummies (Sort of)

There's been a lot of media attention on the new Top-Level Domain (TLD) process in the last few days, which is a good thing. Unfortunately most of it is badly written, misleading or simply misinformed. Let's look at the reality. To start with, there are currently 20 gTLDs i.e. "global" Top-Level Domains (extensions)... more

China Launches World’s First Underwater Data Center

China has achieved a world first by starting the assembly of an underwater commercial data center off the coast of Sanya, on Hainan Island, according to China Daily. more

Court Finds Anti-Malware Provider Immune Under CDA for Calling Competitor’s Product Security Threat

Plaintiff anti-malware software provider sued defendant -- who also provides software that protects internet users from malware, adware etc. -- bringing claims for false advertising under the Section 43(a) of Lanham Act, as well as other business torts. Plaintiff claimed that defendant wrongfully revised its software's criteria to identify plaintiff's software as a security threat when, according to plaintiff, its software is "legitimate" and posed no threat to users' computers. more

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more

Pew Looks at the State of Online Music Ten Years After Napster

Pew Internet reporting on the 10th anniversary of the Napster's launch: "As researchers look back on the first decade of the 21st Century, many will no doubt point to the formative impact of file-sharing and peer-to-peer exchange of music on the internet. Distributed networks of socially-driven music sharing helped lay the foundation for mainstream engagement with participatory media applications. Napster and other peer-to-peer services "schooled" users in the social practice of downloading, uploading, and sharing digital content, which, in turn, has contributed to increased demand for broadband, greater processing power, and mobile media devices." more

DNC Emails Hacked Using Fake Gmail Login Forms

A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. more

Verisign Will Help Strengthen Security With DNSSEC Algorithm Update

As part of Verisign's ongoing effort to make global internet infrastructure more secure, stable, and resilient, we will soon make an important technology update to how we protect the top-level domains (TLDs) we operate. The vast majority of internet users won't notice any difference, but the update will support enhanced security for several Verisign-operated TLDs and pave the way for broader adoption and the next era of Domain Name System (DNS) security measures. more