/ Most Viewed

Encrypted Email Sign Ups Have Doubled Since Trump Victory, Says PortonMail

Since Trump’s victory, the number of new users signing up for the Switzerland-based encrypted email service provider, ProtonMail, has doubled compared to the previous week, the company reported. more

ICANN Facing Critical Choice for Plan to Change DNS Cryptographic Key

While the majority of ICANN's Security and Stability Advisory Committee (SSAC) have given the organization the green signal to roll, or change, the "top" pair of cryptographic keys used in the DNSSEC protocol, commonly known as the Root Zone KSK (Key Signing Key), five members of the committee advised against the October 11 rollover timeline. more

An Attack on WiFi Spectrum

A little over a year ago, the FCC approved the use of 1,200 MHz of spectrum in the 6 GHz band for public use -- for new WiFi. WiFi is already the most successful deployment of spectrum ever. A year ago, Cisco predicted that by 2022 that WiFi will be carrying more than 50% of global IP traffic. These are amazing statistics when you consider that WiFi has been limited to using 70 MHz of spectrum in the 2.4 GHz spectrum band and 500 MHz in the 5 GHz spectrum band. more

Security Expert Bruce Schneier Calls for Creation of New Government Agency for IoT Regulation

During a talk at the RSA Conference, security expert Bruce Schneier called for the creation of a new government agency that focuses on internet of things regulation, arguing that "the risks are too great, and the stakes are too high" to do nothing. more

Video: Highlights of the DNSSEC Key Signing Ceremony

ICANN video highlighting last week's historical DNSSEC key signing ceremony held in a high security data centre located in Culpeper, VA, outside of Washington, DC. "During the ceremony, participants were present within a secure facility and witnessed the preparations required to ensure that the so-called key-signing-key (KSK) was not only generated correctly, but that almost every aspect of the equipment, software and procedures associated with its generation were also verified to be correct and trustworthy." more

Notorious Markets, Scams and Implications for Brands

On January 14, 2021, the Office of the United States Trade Representative (USTR) released its 2020 Review of Notorious Markets for Counterfeiting and Piracy (the Notorious Markets List, or NML). This publication enumerates online and physical markets that have been reported to engage in trademark, counterfeiting, and copyright infringement at scale. For the first time, the NML documents show how internet platforms play a part in bringing illicit goods into the US. more

Registration And Use Of Domain Name Infringing Another’s Trademark Ruled “Advertising Injury” Covere

The registration and use of an Internet domain name that allegedly infringes another's trademark is an "advertising injury" within the meaning of an insurance policy, and thus requires the accused company's insurer to provide coverage, according to a recent ruling by the U.S. Court of Appeals for the Fourth Circuit. In the same ruling, the Fourth Circuit also held that the domain name, because it led customers to advertisements at the related website, constituted use of the trademark "in the course of advertising." State Auto Property and Cas. Ins. Co. v. Travelers Indemn. Co. of Am. more

Goo Goo Goggles: 700MHz Spectrum Auction and the U.S. Taxpayers

Scott Cleland claims the open access rules on 700MHz spectrum triggered by Google's bid fleeced the US taxpayer by $7bn. I don't buy it, even as a signed-up fully-paid network neutrality opponent. Firstly, the numbers ignore economics. If the C block was encumbered, that would raise the prices of the A and B blocks. So you need to take a much smaller differential as to the cost of the encumbrance. more

Thus Ends the Stupid Network Model?

There is an article in EETimes by Fay Arjomandi of Vancouver-based Mobidia that may shake up the fans of the 10 year old stupid network principle. The stupid network essay calls for intelligence to reside at the edge of the network, rendering IP networks to plumbing pipes -- with carriers ignorant of the application and services being transported. more

Internet Vigilantism

Atrivo (aka Intercage), a Concord, California-based Internet hosting service, disappeared from the Internet for around two days recently. They didn't go bankrupt or suffer a physical catastrophe. Their providers simply shut them down by refusing their traffic. This might very well be the first time in history that the Internet community, a cooperative association of networks with no governing body, has collectively put someone out of business, if only briefly. more

Lessons to Be Learned from the Armada Collective’s DDoS Attacks on Greek Banks

'It could've been worse' is a fascinating expression. It implies that the incident in question obviously could have been worse than expected, however it also implies that it could have been better, ultimately leading to the conclusion that it was at least somewhat bad. So both fortunately and unfortunately for three Greek banks, the ransom DDoS attacks levied against them by hacker group the Armada Collective could have been worse. more

Clarivate Domain Survey Reveals a 10% Increase in Cyberattacks

Clarivate has once again surveyed global business leaders about the importance of domain names to their organizations, including the role of domains as intellectual property (IP) assets. The 2020 survey followed up on our 2019 survey, revealing key year-over-year trends in how organizations manage, secure and budget for domain names. In this blog, we review key trends from the new report. more

UK Bill Ups Prison Term for Online Piracy from 2 to 10 Years

The UK government has unveiled its latest Digital Economy Bill as part of an "ambition for the UK to be the most digital nation in the world". more

China’s Latest Internet Crackdown

Seven different government agencies, including the Ministry of Public Security and the State Council Information Office declared war on Internet smut today. 19 Internet companies, including Google, Baidu, Sina, and others, were cited for "violating public morality and harming the physical and mental health of youth and young people."... Another Chinese language report, including video of a TV report with footage of computer servers being confiscated by police at an unknown location and unknown time... more

From Wikileaks of 2012 to Snowden’s NSA Leaks of 2013: Implications for Global Internet Governance

2012 will always be remembered as the Year of Wikileaks. Similarly, 2013 shall also be remembered as the year that Edward Snowden, a computer security specialist and former CIA employee and National Security Agency contractor, leaked classified information regarding the NSA global surveillance programs. Whilst Wikileaks was about US diplomatic cables, the Edward Snowden disclosure of classified NSA information to private media organizations such as the UK Guardian newspaper has had graver implications for global Internet privacy. more