/ Most Viewed

New gTLDs: Floodgates for Spammers?

Ever since I heard of the new generic Top-Level Domains (gTLDs), I wondered whether they would be prone to abuse. For example, Microsoft might want to register www.microsoft.microsoft, or Sony might want to register www.sony. But isn't this opening up the floodgates for spammers to register their own domains and squat on them? Why couldn't a spammer register www.cit.ibank? They could then send phishing messages and fool people into clicking very legitimate looking domains. But I don't think this will be a problem. more

Registration Operations is More Than Just Registering Domain Names

Perceptions can be difficult to change. People see the world through the lens of their own experiences and desires, and new ideas can be difficult to assimilate. Such is the case with the registration ecosystem. Today's operational models exist because of decisions made over time, but the assumptions that were used to support those decisions can (and should) be continuously challenged to ensure that they are addressing today's realities. Are we ready to challenge assumptions? Can the operators of registration services do things differently? more

ICANN Postpones Amazon Domain Decision, Crusade Continues Between Amazon Nations and Amazon Inc.

ICANN on Monday extended the deadline to April for Amazon basin nations to reach a deal with the tech giant Amazon Inc in their seven-year battle over the .amazon domain name. more

Despite Voice and AI Hype: the Domain Name Remains Crucial in Marketing

In the early days of the internet, companies only needed a simple web presence to be among the pioneers of digitization. Playfully animated hover buttons and electronically-synthesized background music were commonly accepted standards. To appear on a search engine, webmasters simply had to submit the URL of their website. more

Microsoft Announces Plans to Adopt DoH in Windows

Microsoft announced today its plans to adopt DNS over HTTPS (DoH) protocol in Windows and will also keep other options such as DNS over TLS (DoT) on the table for consideration. more

Group of Engineers Have Created a Way to Detect Dangerous Objects in Baggage Using Public Wifi

Report describes a technique with which public wifi can be used to identify in-baggage dangerous objects in public spaces that don't typically have affordable screening options. more

VeriSign-ICANN Proposed Settlement Discussed in Vancouver

Unfortunately I cannot be in Vancouver for the conference. I write this from Cape Town, venue of last years fall ICANN. I want to disclose a couple of things upfront. Those who know me will know I am nothing if not strongly independent in my views. However disclosure helps those of a more suspicious mind know my associations and if they choose to, take them into account in interpreting my opinions. ...I am somewhat disappointed by the reaction to the proposed settlement. I feel that most of the discussion fails to take into account the actual conditions under which the settlement has been negotiated. more

The Coming Cybersecurity Regulatory Revolution

Cybersecurity regulation will take its place alongside environmental regulation, health and safety regulation and financial regulation as a major federal activity. What is not yet clear is what form the regulations will take. FISMA controls, performance standards, consensus standards and industry-specific consortia standards are all possible regulatory approaches. What is not likely is an extended continuation of the current situation in which federal authorities have only limited, informal oversight of private sector cyberdefenses (or lack thereof). more

Thus Ends the Stupid Network Model?

There is an article in EETimes by Fay Arjomandi of Vancouver-based Mobidia that may shake up the fans of the 10 year old stupid network principle. The stupid network essay calls for intelligence to reside at the edge of the network, rendering IP networks to plumbing pipes -- with carriers ignorant of the application and services being transported. more

ICANN: Do Not Allow Closed New gTLDs With Generic Strings

Within the next year, the ICANN Board may well face a decision that will help determine whether ICANN is capable of serving the global public interest or whether it is degenerating into an industry-controlled self-regulatory association. The issue can be framed quite simply: will ICANN approve a process for the creation of a new wave of new generic top level domains that will include "closed generic" gTLDs? more

Registrar Abacus America is in Corporate Delinquency

KnujOn has retrieved a document indicating that the ICANN-Accredited Registrar Abacus America is in Corporate Delinquency in the state of Kansas. Kansas defines a company as Delinquent if "The business entity has not filed its annual report and fee by the due date." ... This incident is significant because Abacus America was cited by LegitScript and KnujOn for sponsoring an unlicensed pharmacy selling Schedule 3 substances... more

CENTR Publishes a Paper on Domain Name Registries and Online Content

The Council of European National Top-Level Domain Registries (CENTR) has published a paper on Domain name registries and online content which explores the domain name registries' relation and role regarding content online. more

UDRP Standing: Proving Unregistered Trademark Rights

The Uniform Domain Name Dispute Resolution Policy is a non-exclusive arbitral proceeding (alternative to a statutory action under the Anticybersquatting Consumer Protection Act) implemented for trademark rights' owners to challenge domain names allegedly registered for unlawful purposes. Policy, paragraph 4(a) states that a registrant is "required to submit to a mandatory administrative proceeding in the event that a third-party... more

Domain Names Identical to Trademarks But No Likelihood of Confusion

Confusion is a basic element in both cybersquatting and trademark infringement. It appears twice in the UDRP; once in paragraph 4(a)(i) in the adjectival phrase "confusing similarity", and once in paragraph 4(b)(iv) in the phrase "likelihood of confusion." Each use of the distinctive phrases is directed to a different observer. More of this in a moment. The first relates to standing; the second to infringement. Unless a party has standing it can have no actionable claim. more

New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol

A new type of DDoS attack takes advantage of an old vulnerability with the potential to put any company with an online presence at risk of attack warn researchers. more