Despite a recent Ninth Circuit decision denying immunity to malware detection software for targeting competitor's software, court holds that Section 230 protected Malwarebytes from liability for designating software driver program as potentially unwanted program. Plaintiff provided software that works in real-time in the background of the operating system to optimize processing and locate and install missing and outdated software drivers. more
Discrimination, Closed Networks and the Future of Cyberspace... Just over a month ago, Karl Auerbach asked, "Is the Internet Dying?". Today, Commissioner Michael J. Copps, of the Federal Communications Commission (FCC) in a speech at the New America Foundation, is asking the very same question, "Is The Internet As We Know It Dying?" and warning about FCC policies that damaged media now threatening the Internet. more
"If I would have a voting right, I would vote like this" said Janis Karklins, chair of the Government Advisory Committee (GAC) as he empathically raised two arms in the air. He was showing his, and the GAC's, overwhelming support for the ICANN Board unanimously (barring one abstention) passing the resolution that ratified the IDN ccTLD Fast Track process, propelling it toward an imminent release. A standing ovation was given from a grateful and exuberant audience and everyone seemed pleased with this momentous decision. more
For a book project I decided to extend my interview with Milton Mueller from November 2003 (Part I | Part II). Exclusively for CircleID readers, here's part III that deals with WSIS, WGIG, US-American bias and the Internet Governance Project. "...One good result of the WGIG process is that the involved international community has already moved beyond those cliches. No one is proposing that the UN control the Internet. There is growing consensus that control of the DNS root needs to be internationalized..." more
This document is intended to be a starting point for a discussion on upcoming city Top-Level Domain Names (city TLDs) such as .berlin, .nyc, or .london. It reflects considerations about the impact of city TLDs on the city society, the individuals in the city, the regional and global environment, and the Internet at large. more
Yesterday, at the annual SHRM Conference in San Diego, the .jobs domain was formally unveiled to the public, and offered exclusively through ICANN authorized registrars. As a HR professional myself, I have conversed with many HR professionals who are often frustrated by the inability to provide an exact destination (i.e., a "jobs" page) that restricts the ability to communicate and otherwise effectively carry out the organizational strategy HR is charged with in our communication to the labor market... more
Yesterday morning (26-April-2011), in US Bankruptcy Court for the District of Delaware, Judge Kevin Gross signed an order authorizing Nortel's sale of IPv4 addresses to Microsoft. This is an important moment for the Internet community, as it represents the beginning of a new market-based mechanism for the distribution of scarce IPv4 address resources. As the various Regional Internet Registry (RIR) organizations exhaust their supply, traditional "needs-based" distribution will become impossible. more
As published on June 24, 2025, it is with no surprise that the AFNIC was renewed as the backend registry provider of the .PARIS new generic Top-Level Domain. What caught my attention in the announcement was this paragraph: “Afnic’s remit will also be expanded to include communication and promotion of the .paris TLD, as well as the development of initiatives designed to increase its adoption by businesses and private individuals.” more
Has your organization recently received an email claiming to be from NABP's Internet Drug Outlet Identification Program (IDOI)? If so, it is possible that someone is trying to trick you. The NABP IDOI team's email account has recently been illegally "spoofed" by unaffiliated persons or organizations. Email spoofing involves the forgery of an email header so that the email appears to have originated from someone other than the actual source. more
While 86 percent of small businesses see the importance of the cloud, 70 percent aren't using cloud solutions. This data, from a Microsoft report for National Small Business Week and reported by Talkin' Cloud, yields a sobering conclusion: Small businesses understand the broad value of cloud computing, but aren't sure how to apply the technology on a case-by-case basis. more
In this article, I present an overview of a series of 'proof-of-concept' studies looking at the application of domain-name entropy as a means of clustering together related domain registrations, and serving as an input into potential metrics to determine the likely level of threat which may be posed by a domain. more
In a significant global operation, law enforcement agencies from 10 countries have severely disrupted the LockBit ransomware group, recognized as the most prolific and harmful cyber threat worldwide. more
Cuba's primary connection to the global Internet is through the ALBA-1 undersea cable linking landing points on the south-east shore of the island to Venezuela and Jamaica; however, the bulk of Cuban traffic originates in Havana which is on the north-west coast. Traffic from Havana and other cities in the west travels over a backbone to reach the cable landing points. A landing point near Havana would reduce the load on the backbone... more
As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more
There has been quite a bit of talk lately about the best way to secure a domain, mainly centered in two camps: using Secure Socket Layer (SSL), or using DNS Security Extensions (DNSSEC). The answer is quite simple -- you should use both. The reason for this is that they solve different problems, using different methods, and operate over different data. more