/ Most Viewed

ICANN Sued in an Attempt to Block .WEB Auction

Controversy over .WEB auction takes a new turn as various sources today pointed to a lawsuit filed against ICANN by Ruby Glen LLC, a subsidiary of Donuts Inc. -- the largest registry for new generic top-level domains (gTLDs). more

The Crypto Wars Resume

For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

Early Disclosure of UDRP Complaints

Under the previous rules for the Uniform Domain Name Dispute Resolution Policy (UDRP), domain name registrants that had a complaint filed against them were supposed to be notified of the complaint by the trademark owner that filed it. Then, a revised set of UDRP rules that went into effect in 2015 eliminated the complainant's obligation to notify the respondent. Instead, the new rules only require the UDRP service provider (such as WIPO or the Forum) notify the respondent, presumably after the registrar has locked the domain name, preventing any transfers. more

Battling Cyber Threats Using Lessons Learned 165 Years Ago

When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more

DCA Trust Strongly Urges ICANN Board Not to Adopt the Proposed Amendment to Its Bylaw

ICANN has been busy in managing several parallel processes that are also closely tied together in one way or the other. The processes include the new gTLD process, the IANA transition and most currently and important action yet that would act as the synergizing factor is the accountability process. ICANN has also posted for public comment proposed Bylaws revisions that would incorporate a higher voting threshold for the Board to determine not to follow the advice of the Governmental Advisory Committee. more

Google and ETECSA Will Agree to Exchange Internet Traffic Without Charge

Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more

Google Flags Entire Web Unsafe, Glitch Due to Human Error According to Company

A glitch in Google's security update on Saturday morning caused links to every search result -- including Google's own pages -- to get flagged with the warning: "This site may harm your computer." The errors caused panic among users around the world who at first feared the popular search engine had suffered a major security failure. The problem which lasted for approximately 40 minutes has now been acknowledged and fixed by Google. The reason for the hiccup, as explained by Google, was due to a human error in the list of URLs Google uses to identify and flag websites known to install malicious software. more

Internet Association Meets With the FCC In Efforts to Preserve Net-Neutrality Rules

Jon Brodkin reporting in Ars Technica: "Federal Communications Commission Chairman Ajit Pai and his staff met yesterday with the Internet Association, a trade group whose members include Amazon, Dropbox, eBay, Facebook, Google, Microsoft, Netflix, PayPal, Reddit, Spotify, Twitter, and about 30 other Web companies. The meeting occurred about a week after Pai reportedly met with broadband industry lobby groups to discuss his plans for eliminating net neutrality rules." more

Facebook Building Its Next Datacenter in Ireland, Most Advanced in the World Company Says

Facebook has announced the construction of a new $220 million (€200 million) data centre in Clonee, County Meath, Ireland. This will be Facebook's sixth data center worldwide and the company's second in Europe, after Luleå in Sweden. more

The Price for Faster Upload Speeds

I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more

Broadband for Communities

When talking about the benefits of broadband, it's easy to overlook how broadband has become the glue that brings people and communities together. This is becoming particularly important for rural communities but matters to people everywhere. Rural communities have been rapidly losing other forms of media that were the focal point in the past. 2004 was the peak of the newspaper business in terms of readership and revenues. more

Canada Caves to the US, Blocks Huawei 5G (Inference)

Huawei is the strong favorite of Canadian network builders, for good products and extraordinary support. It displaced the incumbents at Bell Canada years ago and has a joint "Living Lab" in Vancouver with Telus. Huawei had already won the 5G contracts. It has a thousand researchers and spends a quarter billion dollars on Canadian R&D. It was a government decision. more

New Trojan Used in High Level Financial Attacks, Multiple Banks Attacked

Since January 2016, discreet campaigns involving malware called Trojan.Odinaff have targeted a number of financial organizations worldwide, warned Symantec Security Response team on Tuesday. more

Automated Web Application Attacks Can Peak at 25,000 an Hour

Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to the newly released Imperva Web Application Attack Report. Report also notes that when websites came under automated attack they received up to 25,000 attacks in one hour, or 7 attacks every second. more

Shim6 Host-Based IPv6 Multihoming: Ready for Testing

During the last decade, the Internet Engineering Task Force (IETF) has been designing IPv6 as a replacement for IPv4. Most of the initial benefits of IPv6 (security, QoS, autoconfiguration,...) have been ported to IPv4 and IPv6 deployment has been limited. However, thanks to the huge IPv6 addressing space, it is possible to design protocols and mechanisms that are more scalable and more powerful than with IPv4. A typical example is the multihoming problem. This problem occurs when a site is attached to several Internet Service providers... more