Two new sites for commentary on the Internet Governance Forum have launched ahead of its inaugural meeting in Athens which is due to take place from 30 October to 2 November 2006. The first is an official forum, at which the only topic presently available for discussion is the important one of how to best enable remote participation in the IGF's deliberations... more
WhatsApp is now broadly disrupted in China including text messages which were going through despite China's censorship of the app beginning mid-July which only effected photographs and video chats. more
Legal trademark issues related to domain names will take a long time to resolve. Meanwhile, using a statistical model to determine infringement benefits all parties. The legal system has not yet established comprehensive and easy to understand rules under which a domain name is considered to infringe on a third party's trademark. The vacuum allows trademark owners and their agents, such as the Coalition Against Domain Name Abuse (CADNA), to sue domain name owners pretty much at will, but doing so is not always in the best interest of trademark holders. more
Attendees at the public ICANN meeting in Brussels today heard from over two dozen companies that have implemented or are planning to support DNSSEC, the next-generation standard protocol for secured domain names. It is clearer than ever before that DNSSEC is becoming a reality. more
The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that its ICANN67 Public Meeting, which was to be held in Cancún, Mexico, will now be held via remote participation-only. This decision was made as a result of the COVID-19 outbreak, considered a public health emergency of international concern by the World Health Organization. more
At a financial analyst meeting held by Oracle yesterday, the company was asked about its plans with regards to cloud computing. Oracle's chief executive and founder, Larry Ellison had the following to say in response: "We've redefined 'cloud computing' to include everything we currently do. So it has already achieved dominance in the industry. I can't think of anything that isn't cloud computing. The computer industry is the only industry that is more fashion-driven than women's fashion. Cloud Computing. I remember I was reading W and I read that orange is the new pink..." am Johnston, Strategic Consultant Specializing in Cloud Computing, however wonders if it is any surprise that Oracle would be out badmouthing cloud computing when it has the potential to disrupt their entire business? more
Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more
The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more
International Business Machines Corp (IBM) on Tuesday announced the completion of its $34 billion acquisition of the software company Red Hat Inc making it IBM's largest acquisition ever in its 100-year-plus history. more
I read a blog on the WISPA website written by Mark Radabaugh that suggests that the best policy for broadband speeds would be met by asymmetrical architecture (meaning that upload speeds don't need to be as fast as download speeds). I can buy that argument to some extent because there is no doubt that most homes download far more data than we upload. But then the blog loses me when Mr. Radabaugh suggests that an adequate definition of speed might be 50/5 Mbps or 100/10 Mbps. more
For the first time, a large dataset has been released by a security firm to help AI research and training of machine learning models that statically detect malware. more
As I've written before, the Uniform Rapid Suspension System (URS) - the domain name dispute policy applicable to the new generic top-level domains (gTLDs) - is just not catching on. Whether because of its limited suspension remedy, high burden of proof or other reasons, the URS remains unpopular among trademark owners. However, there's one interesting use to which the URS can be put. more
Are file inclusion vulnerabilitiess equivalent to remote code execution? Are servers (both Linux and Windows) now the lower hanging fruit rather than desktop systems? In the February edition of the Virus Bulletin magazine, we (Kfir Damari, Noam Rathaus and Gadi Evron (me) of Beyond Security) wrote an article on cross platform web server malware and their massive use as botnets, spam bots and generally as attack platforms. Web security papers deal mostly with secure coding and application security. In this paper we describe how these are taken to the next level with live attacks and operational problems service providers deal with daily. more
A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more
If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more