/ Most Viewed

What Trademark Owners Need to Know to Avoid Reverse Domain Name Hijacking

A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more

New MANRS Initiative Aims to Improve Security of Internet Routing

How can we work together to improve the security and resilience of the global routing system? That is the question posed by the "Routing Resilience Manifesto" site with the suggested answer launched today of the "Mutually Agreed Norms for Routing Security (MANRS) document, to which a number of network operators have already signed on as participants, including: Comcast, Level 3, NTT, RUNNet, ClaraNet, SURFnet, SpaceNet, KPN and CERNET. more

Taking the Anti-SOPA Message to the People

It was fascinating last week to read coverage of congressional hearings around the SOPA bill, or Stop Online Privacy Act. The bill has strong support from the Motion Picture Association of America, the U.S. Chamber of Commerce and big pharmaceutical companies. It's opposed by most technology and telecom companies, plus consumer advocate groups like the Electronic Frontier Foundation and Public Knowledge. more

The Good Old Days in the Cryptography Wars

The 20th century was the golden age of surveillance. High-speed communication went either by telegraph and telephone, which needed a license from the government, or by radio, which anyone can listen to. Codes were manual or electromechanical and were breakable, e.g., the Zimmermann telegram and Bletchley Park. (The UK government spent far more effort inventing a cover story for the source of the telegram than on the break itself, to avoid telling the world how thoroughly they were spying on everyone.) more

The Security Problem with HTML Email

Purists have long objected to HTML email on aesthetic grounds. On functional grounds, it tempts too many sites to put essential content in embedded (or worse yet, remote) images, thus making the messages not findable via search. For these reasons, among others, Matt Blaze remarked that "I've long thought HTML email is the work of the devil". But there are inherent security problems, too (and that, of course, is some of what Matt was referring to). Why? more

Facebook’s New Messaging Platform

On Monday, Facebook announced that they were introducing a new messaging platform. Facebook is careful to point out that this is not a replacement for email; it is not email, so they claim. So what is it? This messaging platform is basically a way to talk to people outside of Facebook from Facebook... Essentially, independent of the platform, you can still use the feature. It's kind of like everything Java promised in the 1990's -- it runs on Windows, the Mac or Unix. more

ICANN Must Release the Single-Character .com Hostages from the IANA Impostor’s Warehouse

Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more

Call for Participation - DNSSEC Workshop at ICANN 55 in Marrakech, Morocco

Do you have an idea for a new way to use DNSSEC or DANE to make the Internet more secure? Have you recently installed DNSSEC and have a great case study you can share of lessons learned? Do you have a new tool or service that makes DNSSEC or DANE easier to use or deploy? Do you have suggestions for how to improve DNSSEC? Or new ways to automate or simplify the user experience? If you do, and if you will be attending ICANN 55 in Marrakech, Morocco (or can get there), we are now seeking proposals for the ICANN 55 DNSSEC Workshop that will take place on Wednesday, 9 March 2016. more

10 Reasons Why New gTLDs May Not Work For You

World's mega businesses are about to wake up to the domain name expansion reality, where suddenly a name identity's exclusive ownership on global canvas of cyber branding and functionality will be ensured via gTLD. Something that traditional trademark system took years to achieve. A gTLD brand is not for everyone, structurally designed for powerful new ideas and established organizations around the world; however, following are the ten reasons why it may not work for you. more

5 Million Domain Names Registered in Q3 of 2012, Total Domains Pass 246 Million Worldwide

The third quarter of 2012 closed with a base of more than 246 million domain name registrations across all Top- Level Domains (TLDs), an increase of 5.7 million domain names, or 2.4 percent over the second quarter of 2012, according the latest Domain Name Industry Brief report from Verisign. From the report: "Registrations have grown by 26.4 million, or 12 percent, year over year. The base of Country Code Top-Level Domains (ccTLDs) was 104.9 million domain names, a 4.6 percent increase quarter over quarter, and a 20.7 percent increase year over year in the base." more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

Mobiles Moving Into Fixed Networks

There are often confused reports in the media about mobile and fixed broadband, with arguments that one could replace the other. Yet the reality is that they coexist and complement each other - perhaps even more so since one cannot manage without the other. Increasingly, devices such as smartphones, tablets and smart TVs are at the end of fixed lines, with a wireless (WiFi) connection between the fixed line and the device. more

Lawless Canada Emerging as a Spam Haven

The recent Facebook case has placed the spotlight on Canada's ongoing failure to address its spam problem by introducing long overdue anti-spam legislation. The fact that organizations are forced to use U.S. courts and laws to deal with Canadian spammers points to an inconvenient truth – Canadian anti-spam laws are woefully inadequate and we are rapidly emerging as a haven for spammers eager exploit the weak legal framework. more

Why Telecoms Regulators Must Ignore ‘Lawgeneers’

My attention was drawn recently to the article Europe Is About to Adopt Bad Net Neutrality Rules. Here's How to Fix Them by Barbara van Schewick from Stanford Law School. Much as I would like to spend my morning doing other work, I can see imminent harm that these (and many similar) proposals cause to the public. As a responsible professional and native European, I would like to summarise why it is imperative for EU regulators to ignore these siren calls (if they want to retain their legitimacy). more

Governments Shouldn’t Play Games with the Internet

Governments often use small players as pawns in their global games of chess. Two weeks ago the European Court of Justice invalidated the EU-US Safe Harbor ("Safe Harbor") framework, turning Internet businesses into expendable pawns in a government game. But for the past fifteen years, Safe Harbor allowed data flows across the Atlantic -- fostering innovation and incredible economic development. more