/ Most Viewed

Understanding ‘Reverse Domain Name Hijacking’ Under the UDRP

"Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more

Heartbleed: Don’t Panic

There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more

Meta Lawsuit Leads to Significant Decline in Phishing Domains Tied to Freenom

A lawsuit filed by Meta has led to a significant decrease in phishing websites tied to the domain name registrar Freenom. Cybersecurity expert Brian Krebs in a report on Friday said that Freenom, which provides free domain name registration services, was a favored resource for cybercriminals due to its policy of protecting customer identities. more

Data Center Hardware and Software Grew by 17% in 2018

Global spend on data center hardware and software grew by 17% in 2018 with total infrastructure equipment revenues reaching $150 billion, according to new data released by Synergy Research Group. more

How Is Russia Connected to the Wider Internet?

Speculation about Russia disconnecting or being disconnected from the wider Internet abounds. In this article, we look at the connectivity of the Russian Internet to the wider Internet and how this evolved around the Russian invasion of Ukraine and the related sanctions. more

Is The Term “Cyberwarfare” Overstating the Case?

At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled "Cyberwar: Reality or Weapon of Mass Distraction?" In it, Lee talks about how the term "cyberwar" is thrown around a lot these days. However, he disagreed with the use of the term because it uses inflationary language and overstates the case; today's "cyberwar" is not the same as a conventional ware. more

Failure in ICANN’s Governance Framework

The legitimacy of the ICANN multistakeholder model and its governance framework are facing an existential threat requiring immediate attention. The recently announced results of the ICANN Nominating Committee highlight how the ICANN Board is captured by "affiliated" directors, which threatens its independence and ability to act for the public interest. more

The EPDP on Generic Top-Level Domain Registration Data: Phase 1 Down, Phase 2 To Go

The ICANN community recently gathered in Kobe, Japan for its first meeting of the year and it was certainly a busy week for attendees. Much of the meeting centered around the work of the Expedited Policy Development Process (EPDP) to address gTLD registration data. As a member of the EPDP team, we had been hard at work since being formed in August of 2018. Just prior to the Kobe meeting, we published the phase 1 Final Report. more

No Free Lunch in Internet Peering or Transit

Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more

Survey Predicts Attacks on the Network Infrastructure Within 10 Years

Pew Internet Project has released a report called "The Future of the Internet" based on a recently conducted survey where 1,286 internet experts are said to have looked at the future impact of the internet and assessed predictions about how technology and society will unfold. The following is and excerpt from the report predicting at least one devastating attack will occur in the next 10 years on the networked information infrastructure or the United States power grid. more

Help ICANN Fix Whois Conflicts With Data Privacy Law

ICANN has opened a comment period in relation to whois conflicts with local law / data privacy law. Of course anytime ICANN, or anyone else, tries to make any changes to whois policy there are issues. Whois is, for a variety of reasons, an emotive subject... under EU law many feel that registration details for domain name registrants need to be handled in a manner that is more compatible with the EU Directives and local law more

Independent Objector (IO) Launches Objection on New Applied-for gTLDs

Independent Objector (IO) has lodged objections on 24 new Applied-for gTLD (name scripts) before the International Chamber of Commerce (ICC) on 12th March 2013. IO has exercised his important role and functionality in favor of Public interests on the grounds of Limited Public Interest and Community. New gTLD name scripts .Med, .Health, .Hospital, .Amazon, .Indians are included in the list of objections filed. more

Domains and the Freedom to Speak

For a very long time, predating the birth of ICANN, there's been a running battle about what should be required when one registers domain names. To oversimplify quite a lot, one side sees domain names as an essential component of free speech, so anyone should be able to register any domain without limit, the other notes that they're primarily used for commercial purposes and they enable quite a lot of mischief, so the more control, the better. more

Join Live On Sunday - 2nd Registration Operations Workshop (ROW) In Dallas

This Sunday, March 22, 2015, the second Registration Operations Workshop (ROW) will be taking place at the Fairmont Dallas hotel from 12:30 -- 4:30 pm CDT. Discussion will include extensions to EPP, new encryption initiatives and also suggestions for ways to further automate DNS interactions between registries, registrars and DNS operators, including a need to do this for DNSSEC. more

NIS2, ICANN and “Thick” WHOIS: A Mandate to Move Forward

The recent adoption at the end of December of the new EU Directive for a high level of cybersecurity across the Union -- commonly referred to as "NIS2" - paved the way for important updates to the domain name system (DNS). Most significantly, Article 28 of NIS2 and its related recitals resolved any ambiguities about the public interest served by a robust and objectively accurate WHOIS system that permits legitimate access by third parties to data... more