/ Most Viewed

Sprint’s Big Deal: New Life for WiMax

The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more

ICANN 53: Accountability, Brand Policy & New Round of New gTLDs

In June, MarkMonitor joined our colleagues once again at the Internet Corporation of Assigned Names and Numbers (ICANN) 53rd public meeting in Buenos Aires, Argentina. Several high-profile and contentious issues were on the agenda, many of which have significant impact on the interests of intellectual property and brand owners. Among these are the ongoing ICANN Accountability issues and the impending departure of ICANN CEO Fadi Chehadé; registrant information (Whois) transparency, accuracy and accessibility; and the timing of the next round of new gTLD applications/delegation. more

In Support of ICANN’s New Trademark Protection Rules (Mostly)

Yesterday, I sent ICANN my comments about the draft recommendations from ICANN’s Implementation Recommendation Team (IRT), which has been tasked with coming up with a trademark protection scheme for new top-level domains. For the most part, I think they did an excellent job... more

AOL Has a Security Hole, and It’s Our Problem

Two weeks ago I wrote about Yahoo's unfortunate mail security actions. Now it's AOL's turn, and the story, as best as I can piece it together, is not pretty. Yahoo used an emerging system called DMARC, which was intended to fight phishing of often forged domains like paypal.com. A domain owner can publish a DMARC "reject" policy which, oversimplifying a little, tells the world that if mail with their name on the 'From:' line didn't come from their servers, it's not from them so you should reject it. more

Understanding and Detecting Mobile Malware Threats

Every couple of years there's a new "hot threat" in security for which vendors abruptly tout newfangled protection and potential customers clamor for additional defense options. Once upon a time it was spyware, a few years ago it was data leakage, and today it's mobile malware. It's a reoccurring cycle, analogous to the "blue is the new black" in fashion -- if you fancy adopting a certain cynical tone. more

Why Do Chinese Enterprises Ignore the Internet?

Judging from the development of the Internet in the world, the popularity rate of domain names is one of the primary parameters to measure whether the Internet is well developed or not in a country. The popularity rate of domain names is 11 percent in North America and reaches as high as 12.5 percent in Europe, while in China, which has over 20 million enterprises, there are only more than 300,000 domain names under .CN and the total number of domain names is only 1.187 million, including a lot of governmental and individual websites. more

Kaspersky Lab Software Too Deeply Embedded in US Gov Network, Impossible to Get Rid Off by October

The law set by U.S. Government for all agencies to fully remove the controversial Russian based Kaspersky Lab security software by October is proving a lot harder than anticipated. more

Crypto War III: Assurance

For decades, academics and technologists have sparred with the government over access to crypographic technology. In the 1970s, when crypto started to become an academic discipline, the NSA was worried, fearing that they'd lose the ability to read other countries' traffic. And they acted. For example, they exerted pressure to weaken DES... The Second Crypto War, in the 1990s, is better known today, with the battles over the Clipper Chip, export rules, etc. more

Reflections on NANOG 66

The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more

An Example of Effective Government Support for New Communication Technology

The October Senate Commerce, Science, and Transportation Committee hearing on the commercial satellite industry provides a current example of effective government support of new communication technology. The hearing focused on broadband access, primarily from low-Earth orbit (LEO) satellites. Witnesses from four companies - Intelsat, OneWeb, ViaSat and SpaceX - testified and the tone of the hearing was set by the opening statements of Committee Chairman John Thune and Ranking Member Bill Nelson. more

Popular ccTLDs for Domain Name Disputes

As I've written before, the registry operators for many country-code top-level domains (ccTLDs) have adopted the Uniform Domain Name Dispute Resolution Policy (UDRP) or a variation of it, while other ccTLDs have crafted their own dispute policies, or none at all. Although no ccTLD appears as frequently as .com in domain name disputes, it's interesting to see which ccTLDs are subject to dispute the most often. more

Fixing WHOIS (and Some Other Stuff Too)

ICANN is the only institution with responsibility for the functioning of DNS. And so it is natural that when there is a DNS problem for people to expect ICANN to come up with the solution. But having the responsibility to act is not the same as having the ability. Like the IETF, ICANN appears to have been designed with the objective of achieving institutional paralysis. And this is not surprising since the first law of the Internet is 'You are so not in charge (for all values of you). more

The Internet and the Legitimacy of Governments

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more

Latest Wave of Organized Phishing Attacks Beat Two-Factor Authentication

Researchers at Certfa Lab provide a review of the latest wave of organized phishing attacks by Iranian state-backed hackers which succeeded by compromising 2-factor authentication. more

Virtual Extortion?

Maybe you saw this story: A Chinese man (whose name is not given) has been sentenced to serve three years in prison for extorting "virtual items and currency" from a "fellow Internet café user." The currency was worth 100,000 yuan or $14,700. The man who's sentenced to three years and the three friends who helped him also "extorted virtual equipment for online games" from their victim. The friends only seem to have been given a fine; the primary extortionist got both a fine and a jail time. The virtual currency was QQ coins... As I'm sure all of us know, there's a thriving market in virtual goods and currency... more