In recent weeks, you may have seen several articles asking that "ICANN", the Internet Corporation for Assigned Names and Numbers, move more expeditiously to open up the next application window for new gTLDs. As one commenter wrote "Ask a Board member or ICANN staff when they expect the next application window to open, and they will inevitably suggest 2020 -- another three years away. more
The so-called notice-and-take-down provisions of the Digital Millennium Copyright Act (DMCA) provide both a very effective tool for copyright owners to get infringing content removed from the Internet as well as an important protection for service providers (such as website hosting companies) that may inadvertently publish infringing material, either directly or via user-generated content. more
I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any developing and least developed country. Especially in Asia Pacific region where the need and use of such document is immense, as there is a gap in recognition and awareness of rights of internet users. more
It's official. A team of market analysts from Oppenheimer are saying [PDF] what I've been saying since 1997, that the apps are separating from the network, and this is driving a wave of "explosive innovation." more
NTIA has published a Notice for Public comment that is titled "The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things". This could become ICANN-2, bigger, longer, and uncut; and with a much greater impact on the future direction of the internet. However, my thoughts on this go well beyond the possibility of another ICANN. more
The fixed broadband network is the infrastructure needed to meet the needs, both economic and societal, of developed markets. While some people in some developed markets have abandoned their fixed telephone connection in favour of all-mobile solutions, the majority (90% plus) still have both a fixed and a mobile connection... And so wireless broadband and FttH will develop, in a complementary and harmonious way. There are several reasons for this. more
Government are recognising that healthcare is one of the last paper-based sectors of the economy. It has been estimated that, quite apart from the costs involved, this leads to then of thousands of deaths each year. There is no doubt that a fully integrated computerised e-health system will bring with it its own challenges, and will undoubtedly on occasions also deliver its share of problems. But, as has been the case with all other sectors of society and the economy, integrated computerisation in this sector will improve the situation. more
The new Global Phishing Survey released by the Anti-Phishing Working Group (APWG) this month reveals that phishing gangs are concentrating their efforts within specific top level domains (TLDs), but also that anti-phishing policies and mitigation programs by domain name registrars and registries can have a significant and positive effect. The number of TLDs abused by phishers for their attacks expanded 7 percent from 145 in H2/2007 to 155 in H1/2008. The proportion of Internet-protocol (IP) number-based phishing sites decreased 35 percent in that same period, declining from 18 percent in the second half of 2007 to 13 percent in the first half of 2008. more
On 19 February 2020, ICANN announced that ICANN67 would be held via remote participation out of an abundance of caution associated with the COVID-19 outbreak. Little did we know at the time that twelve months later, ICANN meetings would still be held via remote participation. For a community that has been accustomed to meeting face-to-face at least three times a year since ICANN1 in Singapore in March 1999, this has created a tremendous challenge for how we conduct our business. more
NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more
We all remember the nightmare of following the multiple versions of the "AGB" from the ICANN new gTLD program, and the time it took to get to the final version, which then took to allowing applicants to submit their new gTLD application, and which then took them to wait for their application to proceed... Welcome to version 0.5 of the next Applicant Guidebook. more
It seems almost monthly that I am asked about the role that ISPs should take in making sure that we solve the digital divide. I think that people are somewhat shocked every time when I tell them this is not a role for ISPs. In explaining my answer, let me start by parsing what is meant by the question. We are about to see a lot of grant funding for getting computers into homes and training folks on how to use them. more
Equifax has announced a comprehensive resolution for its 2017 cybersecurity incident that includes a fund of up to $425 consumer fund. more
One of the most popular top-level domains under the Uniform Domain Name Dispute Resolution Policy (UDRP) is not even a gTLD (generic top-level domain). It's a ccTLD: .co, the country-code top-level domain for Colombia, in South America. Based on statistics at WIPO as of this writing, 29 .co domain names have been the subject of UDRP disputes this year, making it the most-disputed ccTLD under the popular domain name dispute policy. more
The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more