/ Most Viewed

Letter from EU to UN Secretary General

Today the Swedish IT Minister Åsa Torstensson together with the Commissioner Viviane Reding sent a letter to the UN Secretary General Ban Ki-moon. I think the letter is extremely well written, but when I twittered about it, some people contacted me and asked what was so special with it? Let me try to explain... more

WIPO Arbitration and Mediation Center Registers Its 50,000th “Cybersquatting” Case

The WIPO Arbitration and Mediation Center on Monday announced it had registered its 50,000th "cybersquatting" case. The 50,000th case just received by WIPO coincides with the organization's 20th anniversary on November 20, 2020. more

Newly Released “Domain Name Arbitration” Book Offers Guide for Navigating UDRP

Legal Corner Press, LLC recently announced the publication of Domain Name Arbitration: Asserting and Defending Claims of Cybersquatting Under the Uniform Domain Name Dispute Resolution Policy, authored by Gerald M. Levine, intellectual property attorney, with Foreword by Hon. Neil A. Brown QC, former member of the Australian Parliament and a UDRP panelist. more

25 Years of John Barlow’s Declaration of Independence in Cyberspace: When Visions Meet Realities

On February 8, 1996, John Perry Barlow published his "Declaration of Independence in Cyberspace" in Davos. Inspired by the "Digital Revolution" and the "Dot-Com-Boom", he predicted a new "Home of Mind," a cyber world without governments. "Governments of the Industrial World", he wrote, "you weary giants of flesh and steel. I come from cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather." more

iPhone 6 VoLTE Will Disrupt the Mobile Industry

As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more

Moving Beyond Telephone Numbers - The Need for a Secure, Ubiquitous Application-Layer Identifier

Do "smart" parking meters really need phone numbers? Does every "smart meter" installed by electric utilities need a telephone number? Does every new car with a built-in navigation system need a phone number? Does every Amazon Kindle (and similar e-readers) really need its own phone number? In the absence of an alternative identifier, the answer seems to be a resounding "yes" to all of the above. more

Defense Department Demonstrates Compliance with the OMB IPv6 Mandate

IPv6 is "critical to achieve our net-centric vision", said Kris Strance, DoD Lead for IP Policy, speaking at the Information Assurance Collaboration Forum (IACF) in Laurel, Maryland last week. The Defense Department sees the proliferation of IP-addressable devices as a key driver for IPv6 adoption, and does not believe that IPv4 can satisfy its future requirements. The imminent explosion of non-traditional IP-enabled devices that Defense intends to implement may even threaten the large IPv4 address allocations that the Department holds. more

US Should Take More Aggressive Counter-Measures On IP Theft, Including Use of Malware

A bipartisan Commission recently produced a report titled, "The Report of the Commission on the Theft of American Intellectual Property". Karl Bode from dslreports.com writes... more

The Open Internet?

I'm sure we've all heard about "the open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more

An Outlook On The Domain Name Secondary Market

The secondary domain market has gone from one extreme to another. First, huge sums were paid for some domains, raising the expectations of domain sellers. Now, however, in many cases the corporate sector expects to pick up a domain for next to nothing in comparison with the domain's immediate sales and long-term investment potential. In my opinion, both situations are unrealistic. more

91.3% of Malware Use DNS as a Key Capability

Nearly 92 percent of malware use DNS to gain command and control, exfiltrate data or redirect traffic, according to Cisco's 2016 Annual Security Report. It warns that DNS is often a security "blind spot" as security teams and DNS experts typically work in different IT groups within a company and don't interact frequently. more

Why Mexico Lost Fight Over Mexico.com Domain Name

In a recent decision, a World Intellectual Property Organization (WIPO) domain name arbitration panel dismissed a complaint filed by the Mexican Tourist Board (MTB) against Latin America Telecom (LAT) concerning the domain name "mexico.com." The panel went so far as to find that the complaint was brought in "bad faith" and made a finding of attempted "Reverse Domain Name Hijacking" against the MTB. ...In its complaint, the MTB argued that LAT had registered the domain name in "bad faith" in order to sell it for a profit at a later date. more

Skype’s End User License Agreement

I was looking at the End User License Agreement to which Skype wants people to assent. I noticed the following odd provision (Section 3.2.4): You hereby grant to Skype a non-exclusive, worldwide, perpetual, irrevocable, royalty-free, sublicensable and transferable licence to Use the Content in any media in connection with the Skype Software, the Products and the Skype Website. more

Ready or Not… Here Come the IRC-Controlled SIP/VoIP Attack Bots and Botnets!

A story... ZZZ Telemarketing (not a real name) is locked in a heated fight with their bitter rival, YYY Telemarketing (also not a real name), to win a very large lead generation contract with Customer X. Customer X has decided to run a test pitting the two companies against each other for a week to see who can generate the most leads. The ZZZ CEO has said to his staff that it is "do or die" for the company. If they fail to win the contract, they will have to shut down -- they need to do "whatever it takes" to win over YYY. A ZZZ staffer discovers that part of why YYY has consistently underbid them is because they are using SIP trunks to reduce their PSTN connection costs. But the staffer also discovers that YYY is using very cheap voice service providers who run over the public Internet with no security... more

Taking the Leap to Cloud-Based Malware Inspection

Is desktop anti-virus dead? Someday I'd love to make that announcement, but it still feels to me that there's a Patron Saint of Voodoo with an affinity for bringing it back to life -- like some macabre mirror image of the malicious zombies it's supposed to provide protection against. It's kind of ironic that today's innovation in desktop anti-virus isn't really happening at the desktop; rather it's occurring in the cloud. more