The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. ยง 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
Apple is coming out with a full range of new 5G iPhones. The phones have been designed to use the full range of new frequencies that the various cellular companies are touting as 5G, up to and including the millimeter wave spectrum offered in center cities by Verizon. In addition to 5G, the phones have new features like a better camera, better ease at using wireless charging, and a lidar scanner. more
The latest report released by EURid, the operator of Europes .eu domain, has attributed 18% of the growth of the European domain to Ireland followed by Portugal with 16.1% and Norway with 10.8%. more
It's hard to know what to make of the Google/Verizon deal since until earlier today both companies have denied that there is one. And it's hard to argue about net neutrality because it means so many different things to different people. I've got lots of reading to do to catch up on the newly released set of principles from the companies, but in the meantime here are a few thoughts on the topic. more
In the past seven years, the number of people online has essentially doubled, from 1.7 billion in 2009 to about 3.4 billion today. New and innovative services have also emerged and people and companies around the world are using the Internet in ways barely imagined at the turn of the decade. Looking ahead to the next five to seven years, there are many forces at work that could have a significant impact on the Internet. more
Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more
It was reported that .XYZ, .CLUB and .VIP have obtained official license from the Chinese government. The approval notices can be found on the website of the Ministry of Industry and Information Technology ("MIIT"), the domain name regulator in China. It is the first batch of overseas top-level domains (TLD) being officially approved. Previously, only two legacy TLDs -- .COM and .NET -- have been issued such approval. The "green light" means that Chinese registrars are able to sell these domains legally in China. more
Another domain name dispute decision -- this one for '24hour.fitness' -- has highlighted the increasing (potential) relevance of the top-level domain (TLD) under the Uniform Domain Name Dispute Resolution Policy (UDRP). As I have written before, the proliferation of new TLDs is having an impact on whether and how UDRP panels consider the TLD in their decisions. more
As Chairs of ICANN's Registries and Registrar Stakeholder Groups, we are proud to announce that we have initiated a new practice for the Contracted Parties Summits: the publication of our Contracted Parties Summit Statement. As you may (or may not) know, Contracted Parties get together periodically to interact and work together on issues that we care about, and which impact our businesses as registries and registrars. more
Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more
The long-waited cybersecurity executive order expected to launch sweeping reviews of the federal government's digital vulnerabilities, was signed today by President Trump. more
McDowell, commissioner of the Federal Communications Commission, in an op-ed in the Wall Street Journal writes: "On Feb. 27, a diplomatic process will begin in Geneva that could result in a new treaty giving the United Nations unprecedented powers over the Internet. Dozens of countries, including Russia and China, are pushing hard to reach this goal by year's end. As Russian Prime Minister Vladimir Putin said last June, his goal and that of his allies is to establish "international control over the Internet" through the International Telecommunication Union (ITU), a treaty-based organization under U.N. auspices." more
Given the current debate around mass surveillance which is undertaken by both governments and (social) media companies, the recurring question is what is happening to our hard-fought personal freedom? In the case of government-based mass surveillance there isn't an opt-out option, and in reality opt-out is also not a valid solution to services provided by Google, Apple, Facebook and the millions of apps that we all use to some extent or another. more
Worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017, Gartner forecasts. more
Sources are reporting that Tom Wheeler, the Federal Communications Commission chairman, is widely expected this week to propose regulating Internet service similar to a public utility -- a move certain to unleash another round of intense debate and lobbying about how to ensure so-called net neutrality, or an open Internet. more