The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that its ICANN67 Public Meeting, which was to be held in Cancún, Mexico, will now be held via remote participation-only. This decision was made as a result of the COVID-19 outbreak, considered a public health emergency of international concern by the World Health Organization. more
Attendees at the public ICANN meeting in Brussels today heard from over two dozen companies that have implemented or are planning to support DNSSEC, the next-generation standard protocol for secured domain names. It is clearer than ever before that DNSSEC is becoming a reality. more
Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction... more
Internet pioneer and vice president of research at Google, Vint Cerf, said in a tweet this morning that he has tested positive for coronavirus (COVID-19). more
Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more
The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more
For the first time, a large dataset has been released by a security firm to help AI research and training of machine learning models that statically detect malware. more
As I've written before, the Uniform Rapid Suspension System (URS) - the domain name dispute policy applicable to the new generic top-level domains (gTLDs) - is just not catching on. Whether because of its limited suspension remedy, high burden of proof or other reasons, the URS remains unpopular among trademark owners. However, there's one interesting use to which the URS can be put. more
I read a blog on the WISPA website written by Mark Radabaugh that suggests that the best policy for broadband speeds would be met by asymmetrical architecture (meaning that upload speeds don't need to be as fast as download speeds). I can buy that argument to some extent because there is no doubt that most homes download far more data than we upload. But then the blog loses me when Mr. Radabaugh suggests that an adequate definition of speed might be 50/5 Mbps or 100/10 Mbps. more
Are file inclusion vulnerabilitiess equivalent to remote code execution? Are servers (both Linux and Windows) now the lower hanging fruit rather than desktop systems? In the February edition of the Virus Bulletin magazine, we (Kfir Damari, Noam Rathaus and Gadi Evron (me) of Beyond Security) wrote an article on cross platform web server malware and their massive use as botnets, spam bots and generally as attack platforms. Web security papers deal mostly with secure coding and application security. In this paper we describe how these are taken to the next level with live attacks and operational problems service providers deal with daily. more
Have you ever thought of how reputation is created in cyberspace? Beth Noveck wrote an article, 'Trademark Law and the Social Construction of Trust: Creating the Legal Framework for On-Line Identity' in which she argues that, to determine what rules should govern on-line identity, we should look to trademark law, which has the best set of rules to deal with the way reputation is created in cyberspace. more
Section 706 of the Telecommunications Act of 1996 orders the FCC to "encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans." On October 25, The FCC issued a notice of inquiry (NOI) into how well we are doing and invited comments. The NOI points out that COVID and the concomitant increase in the use of interactive applications has "made it clear that broadband is no longer a luxury... more
If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more
International Business Machines Corp (IBM) on Tuesday announced the completion of its $34 billion acquisition of the software company Red Hat Inc making it IBM's largest acquisition ever in its 100-year-plus history. more
A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more