/ Most Viewed

Senate Appropriators Add IANA Language As House Requests GAO Study and Civil Society Opposes Shimkus

The Senate Appropriations Committee just reported out on June 5th its version of the Commerce-Justice-State Departments Appropriations bill for FY 15. In the course of its deliberations it added a consensus amendment on the IANA transition offered by Sen. Mike Johanns (R-NE)... Parsing the amendment's language, the requirement that NTIA conduct a thorough review and analysis of any proposed IANA transition plan amounts to telling it to do its job properly; implicit in this requirement is that the analysis be shared with Congress. more

Dial “L” for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. ยง 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more

Challenges for .brands - How to Engage Internal Stakeholders

Developing a .brand TLD strategy requires resources and input from almost every function in your organisation. Unfortunately, most organisations that applied for a .brand TLD have successfully de-prioritised the project to the point where even the executives who signed off on the project in 2011/2012 may need to be reminded what it is. Funding allocation may or may not still exist. Your digital brand roadmap may or may not include reference to the TLD. more

What Matters in Net Neutrality

It's hard to know what to make of the Google/Verizon deal since until earlier today both companies have denied that there is one. And it's hard to argue about net neutrality because it means so many different things to different people. I've got lots of reading to do to catch up on the newly released set of principles from the companies, but in the meantime here are a few thoughts on the topic. more

Application Delivery Controller: So Long, Crystal Ball

Do you know how big your web site will be in a year? You probably can guess, or even estimate how much traffic will hit your site in a year. You can also use millennia proven methods such as Crystal Balls, Animal Entrails or even Coffee Stains. But seriously, it is no easy task evaluating site growth in this volatile, ever changing economy. A key element in the scaling of any web site is the Application Delivery Controller (ADC). more

$300 Million Annual Loss Due to Non-Cooperation in Fight Against Phishing

During a presentation today at the eCrime Researchers Summit in Atlanta, Georgia, security researchers revealed that average lifetime of malicious websites are often longer than they should be due to lack of communication and cooperation between security vendors. According to results, website lifetimes are extended by about 5 days when "take-down" companies -- often hired by Banks -- are unaware of the site. "On other occasions, the company learns about the site some time after it is first detected by someone else; and this extends the lifetimes by an average of 2 days," says Richard Clayton. more

Apple Buys Into 5G

Apple is coming out with a full range of new 5G iPhones. The phones have been designed to use the full range of new frequencies that the various cellular companies are touting as 5G, up to and including the millimeter wave spectrum offered in center cities by Verizon. In addition to 5G, the phones have new features like a better camera, better ease at using wireless charging, and a lidar scanner. more

Teenager Arrested for Launching Accidental DDoS Attack on 911 Systems via Twitter

Cyber Crimes Unit of Maricopa County, Arizona went into full force on October 23, after reports of serious disruptions into the emergency 911 system for the entire Phoenix metro area. more

Domain Name Disputes Deja Vu: Panavision.com and Panavision.org

History, it has been said, repeats itself. The same can be said of domain name disputes, as demonstrated by a pair of cases involving the same trademark ("Panavision") filed more than 20 years apart with remarkably similar facts. I can't hear the name "Panavision" without thinking about the origins of domain name disputes, so a decision involving panavision.org - coming more than two decades after litigation commenced over panavision.com - immediately made me nostalgic. more

Most Cyberattacks Are From Hostile States, Reports U.K.‘s National Cyber Security Centre

A report from the U.K.'s National Cyber Security Centre blames hostile foreign states for the majority of the 1,167 attacks dealt with in the past two years. more

Why Are the U.S. Broadband Prices So High?

I've wondered for years about why broadband prices are higher in the U.S. than the rest of the world. The average price in other industrial counties is significantly lower. In France, broadband averages $31, Germany is $35, Japan is $35, South Korea is $33, and the U.K. is $35. The average price of broadband in the U.S. is approaching $70, so we're at twice the price as other countries. more

An Open Letter to All New TLD Operators

As many of you will know from my previous posts, I'm pretty passionate about our new TLD industry and genuinely believe we are all working towards a goal that will provide something truly special for future generations to embrace. However, speaking candidly (as is the Australian way), I think we'd all agree that there is much to do to get new TLDs into the mainstream in a timely manner. And as new TLD applicants, we all have a responsibility to work together to ensure the success of our industry for years to come. more

Malware Increasingly Uses DNS As Command and Control Channel to Avoid Detection

Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more

Cybercrime Losses Overestimated, Say Researchers

Cybercrime losses may be erroneously overestimated as most information available on cybercrime losses are derived from surveys, argue two researchers in a recent paper titled, "Sex, Lies and Cybercrime Surveys". Dinei Florencio and Cormac Herley from Microsoft Research examine some of the difficulties of forming an accurate cybercrime estimate by survey. more

Net Neutrality Is a Smashing Success by FCC’s Preferred Metric, Reports Free Press Researcher

"If investment is the FCC's preferred metric, then there's only one possible conclusion: Net Neutrality and Title II are smashing successes," says Free Press Research Director S. Derek Turner, author of a new report released by the consumer advocacy group. more