/ Most Viewed

Predicting Domain Name Trademark Infringement

Legal trademark issues related to domain names will take a long time to resolve. Meanwhile, using a statistical model to determine infringement benefits all parties. The legal system has not yet established comprehensive and easy to understand rules under which a domain name is considered to infringe on a third party's trademark. The vacuum allows trademark owners and their agents, such as the Coalition Against Domain Name Abuse (CADNA), to sue domain name owners pretty much at will, but doing so is not always in the best interest of trademark holders. more

Oracle’s Larry Ellison Downplays Cloud Computing: But Is It Any Surprise?

At a financial analyst meeting held by Oracle yesterday, the company was asked about its plans with regards to cloud computing. Oracle's chief executive and founder, Larry Ellison had the following to say in response: "We've redefined 'cloud computing' to include everything we currently do. So it has already achieved dominance in the industry. I can't think of anything that isn't cloud computing. The computer industry is the only industry that is more fashion-driven than women's fashion. Cloud Computing. I remember I was reading W and I read that orange is the new pink..." am Johnston, Strategic Consultant Specializing in Cloud Computing, however wonders if it is any surprise that Oracle would be out badmouthing cloud computing when it has the potential to disrupt their entire business? more

ICANN to Hold First-Ever Remote Public Meeting

The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that its ICANN67 Public Meeting, which was to be held in Cancún, Mexico, will now be held via remote participation-only. This decision was made as a result of the COVID-19 outbreak, considered a public health emergency of international concern by the World Health Organization. more

It’s the Latency, FCC

Section 706 of the Telecommunications Act of 1996 orders the FCC to "encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans." On October 25, The FCC issued a notice of inquiry (NOI) into how well we are doing and invited comments. The NOI points out that COVID and the concomitant increase in the use of interactive applications has "made it clear that broadband is no longer a luxury... more

DNSSEC Becomes a Reality Today at ICANN Brussels

Attendees at the public ICANN meeting in Brussels today heard from over two dozen companies that have implemented or are planning to support DNSSEC, the next-generation standard protocol for secured domain names. It is clearer than ever before that DNSSEC is becoming a reality. more

Future of .io Domain Uncertain as UK Relinquishes Chagos Islands

The United Kingdom's recent decision to relinquish control over the Chagos Islands as part of a treaty with Mauritius has raised significant questions about the future of the popular .io domain. more

To Tax or Not to Tax

Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more

Officially Compromised Privacy

The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more

Large Open-Source Data Set Released to Help Train Algorithms Spot Malware

For the first time, a large dataset has been released by a security firm to help AI research and training of machine learning models that statically detect malware. more

Using the URS as a Preliminary Injunction for Domain Name Disputes

As I've written before, the Uniform Rapid Suspension System (URS) - the domain name dispute policy applicable to the new generic top-level domains (gTLDs) - is just not catching on. Whether because of its limited suspension remedy, high burden of proof or other reasons, the URS remains unpopular among trademark owners. However, there's one interesting use to which the URS can be put. more

What’s the Right Definition of Upload Speed?

I read a blog on the WISPA website written by Mark Radabaugh that suggests that the best policy for broadband speeds would be met by asymmetrical architecture (meaning that upload speeds don't need to be as fast as download speeds). I can buy that argument to some extent because there is no doubt that most homes download far more data than we upload. But then the blog loses me when Mr. Radabaugh suggests that an adequate definition of speed might be 50/5 Mbps or 100/10 Mbps. more

IBM’s $34B Red Hat Aquisition Makes It the World’s Largest Hybrid Cloud Provider

International Business Machines Corp (IBM) on Tuesday announced the completion of its $34 billion acquisition of the software company Red Hat Inc making it IBM's largest acquisition ever in its 100-year-plus history. more

Web Server Botnets and Server Farms as Attack Platforms

Are file inclusion vulnerabilitiess equivalent to remote code execution? Are servers (both Linux and Windows) now the lower hanging fruit rather than desktop systems? In the February edition of the Virus Bulletin magazine, we (Kfir Damari, Noam Rathaus and Gadi Evron (me) of Beyond Security) wrote an article on cross platform web server malware and their massive use as botnets, spam bots and generally as attack platforms. Web security papers deal mostly with secure coding and application security. In this paper we describe how these are taken to the next level with live attacks and operational problems service providers deal with daily. more

Over a Billion Email Addresses of Major Spam Operation Exposed via Unprotected Backups

A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more

What Legal Framework for Online Identity?

Have you ever thought of how reputation is created in cyberspace? Beth Noveck wrote an article, 'Trademark Law and the Social Construction of Trust: Creating the Legal Framework for On-Line Identity' in which she argues that, to determine what rules should govern on-line identity, we should look to trademark law, which has the best set of rules to deal with the way reputation is created in cyberspace. more