/ Most Viewed

Phishing: Competing on Security

The UK today is one of the main attack targets by phishing organized crime groups, globally. Phishing damages will amount to about two billions USD in 2006 worldwide -- not counting risk management measures such as preventative measures, counter-measures, incident response and PR damages. In most cases, phishing is caused by the fault of the users, either by entering the wrong web page, not keeping their computers secure or falling for cheap scams. Often this is due to lack of awareness or ability in the realm of Internet use rather than incompetence by the users... more

IoT Developments: NIST Issues Tech Guidance while NTIA Seeks Broad Input, Global Efforts Percolate

As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability.  more

IPv6: The High VoLTEage Telephony Generator

According to IDC, smartphones outsold personal computers, laptops included in Q4 2010! Nokia just announced the demise of the Venerable Symbian in favour of Windows 7 phone and Microsoft's bing search engine! Tectonic shifts are under way to adapt to the rise of wireless broadband, an all IP world, and the growing weight of Apple and Google Android. It is also time to head once again for Barcelona with the Mobile World Congress starting on the 14th. Highlights this year? more

IPv6 in Slovak Academic Network

The main reason for developing a new internet protocol was based on lack of address; however this was not the only reason. Unfortunately, many people think of IPv6 only as enormous address space, but there are a lot of other advantages, for example... authorizations and authentication function are implemented directly in the protocol and are mandatory... automatic configuration of network interfaces based on their physical address... protocol itself recognizes data streams which must be transmitted in real time, and the data must be processed with highest priority... more

Major Regulatory Changes Needed as Safety and Security Merge, Warns European Commission Report

As we increasingly move towards an IoT world, vendors of safety-critical devices will be patching their systems just as regularly as phone and computer vendors do now. Researchers warn that many regulators who previously thought only in terms of safety will have to start thinking of security as well. more

Trademark Owners’ Rights to Corresponding Earlier Registered Domain Names

As I pointed out in last week's essay, having trademark rights that come into existence later than registrations of corresponding domain names only gets complainants to first base; they have standing but no actionable claim. I also noted a nuance (not a difference in substance) in standing requirements between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA). However, standing depends upon the specific facts of the case... more

Report on TLD Preference by Country

Which domain extensions do people prefer? How do these preferences vary by country? This article reports the results of a poll of domain extension preference by country of residence conducted from May through October, 2003 by Domain Name Journal and the DomainState forum. Approximately 133 people from 34 different countries participated. This poll has limitations that we will discuss, but it does measure the extension preferences of domain registrants and developers in a manner that has not been done elsewhere and it produces some interesting results. more

2012: The Year of the New gTLD Program and the Year to Support ICANN - Part I

The ICANN new gTLD program began today, 12th January 2012, with the application round now open and this important activity will make 2012 a very memorable year. It is expected that a minimum of 500 fresh applications for new generic Top Level Domains will be received by ICANN through the online TLD Applications System (TAS) by April 12 when the round closes, for processing and evaluation afterwards. This promises to be a hectic and engaging period for new gTLD applicants, and also for ICANN. more

When Space Becomes Infrastructure: Governance Challenges in Record-Breaking Week for Satellites

This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit... more

2019 Domain Name Year in Review

And so it goes, we are coming to the end of 2019, and that can mean only one thing. It's time for another Domain Name Year in Review. And unlike years past, this year was a real doozy. So without further ado, here are the domain name industry's top 10 biggest stories for 2019... To date, 48 leading registries and registrars have signed onto the "Framework to Address Abuse." The initiative was launched in November 2019, just prior to the ICANN meeting in Montreal. more

ICANN Approves IDNs for China, Taiwan, Thailand, Sri Lanka…

A few weeks back I asked Where is China's IDN? ICANN not only answered my question about China, but also about a host of additional countries (and territory) that had applied for fast-track IDNs. Here are the most recent IDN (string evaluation) approvals... more

Cryptocurrency Mining Attacks for the First Time Detected on Industrial Control Systems

A water utility in Europe was compromised by cryptocurrency malware mining attack; the attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial controls systems. more

Security Expert Bruce Schneier Calls for Creation of New Government Agency for IoT Regulation

During a talk at the RSA Conference, security expert Bruce Schneier called for the creation of a new government agency that focuses on internet of things regulation, arguing that "the risks are too great, and the stakes are too high" to do nothing. more

Mark Zuckerberg’s Content Moderation Overhaul: Prelude to a Fragmented Internet and a Threat to Truth

Mark Zuckerberg's recent announcement of sweeping changes to Meta's content moderation policies marks a pivotal moment for the internet, democracy, and truth itself. The decision to replace third-party fact-checking with a decentralized "Community Notes" system and relocate trust and safety operations to Texas signals a shift in Meta's governance approach. This move is not only politically expedient but also a troubling prelude to the tech industry bowing to the political priorities of the incoming Trump administration. more

New gTLDs, Last-Minute End-Arounds, and Fundamental Fairness

The ICANN community is ever closer to realization of its goal to bring long-overdue consumer choice and competition to Internet naming. Regrettably, but perhaps predictably, reliance on the Final Applicant Guidebook (AGB) is being challenged at the last minute by recent proposals from the Business and Intellectual Property Constituencies (BC/IPC), which demand "improvements" to the already extensive trademark protections that will be part of the new gTLD landscape. more