/ Most Viewed

Judge Kocoras Cuts Down $11MM Award Against Spamhaus to $27,000 - e360 v. Spamhaus

e360 v. Spamhaus is one of these cases that's been around so long it feels like an old friend. A few years ago, e360 got some press for winning an eleven million dollar damage award against Spamhaus. In a less heralded development, following a bench trial on damages, last week a district judge modified e360's damage award down to only $27,000 on its tortious interference and defamation claims. more

The Privacy Party and Leaving Dishes in the Sink

Boy, that was a great party the White House threw yesterday when their new online privacy rights were unwrapped and passed around. Most everyone hefted their shiny new rights, agreed they were nice, and talked about the need for swift adoption. But when the party was done, everyone filed out, turning a blind eye to the post-party cleanup and a sink full of dirty dishes. more

New Book Released: International Domain Name Law, ICANN and the UDRP

A new book by David Lindsay, an academic at Monash University's Law School and a widely published expert on internet law, intellectual property law and privacy, has recently been published. ...In this path-breaking work the author examines the extent to which principles of national trade mark law have been used in UDRP decisions. It will be essential reading for anyone, whether academic or practitioner, interested in internet law, intellectual property, and e-commerce law. more

WordPress Parent Company Automattic, and .Blog Operator Switches Registry From Nominet to CentralNic

The operator of .blog top-level domain, Knock Knock WHOIS There, LLC, which is a subsidiary of Automattic, the parent company of WordPress.com and Jetpack, announced on Wednesday that it is "moving into the next phase of .blog." more

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

The Draw: ICANN and a Severe Case of Virus Infection

I propose calling it Values Disorder Syndrome (VDS). It is a virus affecting groups of people. Though rational as individuals, sufferers acting in groups display an inexplicable addiction to the thrill of impunity. That behavior is totally irrational and unrelated to any perspective of gain or purpose... It is certainly a virus, and we know it goes around in ICANN circles. The proof is that the ICANN board has caught it. more

Ransomware Attacks on US Hospitals Trigger Significant Ripple Effects on Neighboring Facilities

In a study published in the JAMA Network, evidence indicates that ransomware attacks on healthcare delivery organizations (HDOs) lead to substantial disruptions in patient care and emergency department workflows. more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

Why This Domain Expert Has Stopped Talking About Domain Names

I'm lucky enough to spend my working life helping some of the world's largest brands drive their .brand TLD projects. The excitement and the challenges of this space stem largely from the fact that this is a new innovation; and when you're working with something truly groundbreaking, naturally there's an element of "learning as you go." And I'm not afraid to admit, sometimes we get things wrong. more

A Journey Into the Surreal: The GOP Protecting “Internet Freedom” With 25 Friends

Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more

The UN’s AI Leadership

In the same way monarchs are proclaimed - by powerful stakeholders attending a coronation and not objecting - the UN's International Telecommunication Union (ITU) took a mandate last week to coordinate AI Safety worldwide, with most industry leaders and relevant UN agencies were present when it did so. more

IGF-USA Teaser. Laura DeNardis: The Internet in Everything

Dr. Laura DeNardis, Professor and Interim Dean of the School of Communication at American University and a Faculty Director of the Internet Governance Lab, is a featured panelist at this week's IGF-USA conference. In advance of the event, I would like to draw attention to her sixth book: The Internet in Everything. Freedom and Security in a World with no Off Switch. This treatise is one of those "should/must-reads" that come along from time-to-time as it focuses on a critical issue that is overlooked by either design or neglect: how digital infrastructure determines policy. more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

Russian Internet Traffic Redirected Due to Routing Errors by China

Doug Madory, Director of Internet Analysis at Dyn, is reporting that the Russian Internet traffic (including domestic traffic) was re-routed out of the country due to routing errors by China Telecom. more