/ Most Commented

Healthy Domains Revisited: The Pharmaceutical Industry

Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more

China Releases Strategy on Cyberspace Cooperation

Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

FCC Blocks Stricter Broadband Privacy Rules

U.S. regulators on Wednesday blocked some Obama administration rules on the eve of implementation, regulations that would have subjected broadband providers to stricter scrutiny than web sites face to protect customers' private data. more

New Cybersecurity Regulations in New York Go Into Effect

Major financial firms operating in New York will face stiff cybersecurity obligations starting Wednesday under a new regulation introduced in the city. more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more

FCC Chairman Ajit Pai: Net Neutrality “A Mistake”, Planning on Much Lighter Style Regulation

During a speech at Mobile World Congress today, Ajit Pai said that net neutrality was "a mistake" and that the commission is now "on track" to return to a much lighter style of regulation. more

So Long, Farewell: The Worst DDoS Attacks of 2016

The year 2016 will go down in infamy for a number of reasons. It was the year an armed militia occupied an Oregon wildlife refuge, Britain voted to Brexit, an overarching event that will simply be referred to as The Election occurred, and Justin Bieber made reluctant beliebers out of all of us. 2016 was also the worst year on record for distributed denial of service (DDoS) attacks by a margin that can only be considered massive. more

Two Approaches to Routers in Space: SpaceX and OneWeb

Two companies hope to revolutionize the Internet by providing global connectivity using constellations of low-earth orbit satellites -- Elon Musk's SpaceX and Greg Wyler's OneWeb. It seems that SpaceX gets a lot more publicity than OneWeb, but both are formidable... SpaceX is integrated -- building the rockets, satellites and ground stations themselves -- while OneWeb has a number of collaborators and investors, including Bharti Enterprises, Coca-Cola, Intelsat, Hughes, Totalplay Telecommunications, Virgin Galactic and Softbank. more

Diversity of View or Unacceptable Inconsistency in the Application of UDRP Law

The general run of Uniform Domain Name Resolution Policy (UDRP) decisions are unremarkable. At their least, they are primarily instructive in establishing the metes and bounds of lawful registration of domain names. A few decisions stand out for their acuity of reasoning and a few others for their lack of it. The latest candidate of the latter class is NSK LTD. v. Li shuo, FA170100 1712449 (Forum February 16, 2017)... It is an example of inconsistency in the application of law. more

There Is No Cuban Home Internet Plan - And That’s Good News

I've followed Cuba's home-connectivity "plan" from the time it was leaked in 2015 until the recent Havana home Internet trial. I thought the plan was a bad idea when it was leaked -- it calls for installation of obsolete DSL (digital subscriber line) technology -- and now that the Havana trial is complete, I question whether the plan was real. ETECSA denied the validity of the leaked presentation at the time, and their definition of "broadband" was "at least 256 kb/s." more

FCC Gives Approval to LTE-U Devices

Ericsson, Nokia get go-ahead for LTE-U base stations despite early fears they might interfere with Wi-Fi. more

Security Researchers Announce First SHA-1 Collision, Confirming Fears About Its Vulnerabilities

In a joint announcement today, Dutch research institute CWI and Google revealed that they have broken the SHA-1 internet security standard "in practice". more

FCC Rolls Back Net Neutrality Transparency Rules for Smaller ISPs

The Republican-controlled FCC on Thursday suspended the net neutrality transparency requirements for broadband providers with fewer than 250,000 subscribers. more

At the NCPH Intersessional, Compliance Concerns Take Centre Stage

The non-contracted parties of the ICANN community met in Reykjavík last week for their annual intersessional meeting, where at the top of the agenda were calls for more transparency, operational consistency, and procedural fairness in how ICANN ensures contractual compliance. ICANN, as a quasi-private cooperative, derives its legitimacy from its ability to enforce its contracts with domain name registries and registrars... more