A recent case1 from a federal court in Kentucky shows why the Anticybersquatting Consumer Protection Act (15 U.S.C. 1125(d) - the "ACPA") can be - when compared to the Uniform Domain Name Dispute Resolution Policy ("UDRP") - a relatively inefficient way of resolving a domain name dispute. Here is a quick rundown of the facts. Defendant owned a business directly competitive to plaintiff ServPro. Plaintiff had used its mark and trade dress since the 1960's... more
In a previous blog post I mentioned that the FCC had taken away restrictions to allow broadband supplied by E-Rate funding to be used to provide free WiFi for the public. That's a good idea that will provide some relief for areas with little or no other broadband. But the announcement raises a more fundamental question - why was such a restriction in place to begin with? more
Microsoft Corp. on Monday released an official announcement stating it has reached an agreement to acquire GitHub for $7.5 billion, confirming rumors reported last week. more
Under the previous rules for the Uniform Domain Name Dispute Resolution Policy (UDRP), domain name registrants that had a complaint filed against them were supposed to be notified of the complaint by the trademark owner that filed it. Then, a revised set of UDRP rules that went into effect in 2015 eliminated the complainant's obligation to notify the respondent. Instead, the new rules only require the UDRP service provider (such as WIPO or the Forum) notify the respondent, presumably after the registrar has locked the domain name, preventing any transfers. more
In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. more
A new cybersecurity company called Chronicle has emerged from Alphabet's "moonshot factory," that's dedicated to helping companies find and stop cyberattacks before they cause harm. more
Worldwide internet traffic plunged by around 40% as Google services suffered a complete black-out, according to web analytics experts. The tech company said all of its services from Google Search to Gmail to YouTube to Google Drive went down for between one and five minutes on Friday. more
Over the past weeks, communities gathering experts from government, business, Civil Society, and the academic and technical communities, have been working through open mailing lists and online virtual meetings on IGF Best Practices. The discussion was documented by independent experts that will feed into five 90 minute Forums in Istanbul and that will in turn report into a Best Practices Main Session. more
Although including multiple domain names in a single UDRP complaint can be a very efficient way for a trademark owner to combat cybersquatting, doing so is not always appropriate. One particularly egregious example involves a case that originally included 77 domain names -- none of which the UDRP panel ordered transferred to the trademark owner, simply because consolidation against the multiple registrants of the domain names was improper. more
"The non-profit that runs all .org domains and provides the bulk of the funding for the Internet Society and Internet Engineering Task Force has just saved itself millions of dollars a year," reports Kieren McCarthy in The Register. more
Council on Foreign Relations has released a brief today authored by Megan Stifel, former director for international cyber policy at the U.S. National Security Council in the Obama administration, urging Trump administration to not back away from the IANA transition and to instead invest in the multistakeholder process. more
In the upcoming Black Hat London presentation, security researcher from University College London, Vasilios Mavroudis and colleagues are going to describe and demonstrate the practical security and privacy risks that arise with the adoption systems enabled with ultrasonic cross-device tracking (uXDT). more
NIST's release of their initial public draft of SP 800-137, Guide for Continuous Monitoring of Information Systems and Organizations will create a set of challenges for the federal cybersecurity community. Agencies and contractors will need to shape the document through the multi-stage revision process while continuing to implement their own continuous monitoring measures. more
On October 30 – 31, 2013, The New York Review of Books held a conference called "Power, Privacy, and the Internet," taking a look at the role of the Internet both as a vehicle of political and cultural dissent and, in the hands of the state, as a weapon of repression and control. The recordings from the event have recently been released where listeners can stream or download the audio. more
Facebook has announced a new routing system aimed at solving fast-recovery challenges for its Terragraph network that brings high-speed internet connectivity to dense urban areas. more