/ Most Viewed

Internet Society Posting Updates from ITU Plenipot 2014 in Busan

If you are, like me, not in Busan, South Korea, for the 2014 ITU Plenipotentiary Conference but are curious about what is going on there, my Internet Society colleagues on our public policy team have been posting regular updates to the Internet Society's blog and to the @ISOCPolicy Twitter account... Given that I work in the technology side of Internet Society's work and don't have the cycles to keep up-to-date with everything going on there in Busan, I've found these updates very helpful in understanding some of the major events happening at the ITU Plenipot 2014. more

Preparing for GDPR’s Impact on WHOIS - 5 Steps to Consider

With GDPR coming into effect this May, it is almost a forgone conclusion that WHOIS as we know it today, will change. Without knowing the full details, how can companies begin to prepare? First and foremost, ensuring that brand protection, security and compliance departments are aware that a change to WHOIS access is on the horizon is an important first step. Just knowing that the ability to uncover domain ownership information is likely to change in the future will help to relieve some of the angst that is likely to occur. more

Will October Be Our Biggest Month Yet for .brand TLDs?

I'll admit I tend to get evangelical when I'm talking about .brands. To me and the team at Neustar, every development in this space is exciting and significant and we're always eager to share the latest news and insights. But you don't have to be a .brands nut to see that the last few weeks have shown some serious signs of momentum. And it makes me wonder, with everything that's developed in just the last week or two, could we be set for October to be the biggest month in .brands we've ever seen? more

In Response to CADNA: Cybersquatting is Not Criminal But a Civil Matter

The Coalition Against Domain Name Abuse (CADNA) recently released a statement that implied that cybersquatting is a criminal activity. It said, "CADNA has been working diligently to further international and national policies that combat the practice of cybersquatting... As brands continue to learn about the prevalence and practice of online criminal activities..." While, Internet Commerce Association (ICA) vigorously opposes cybersquatting, it is important to note that cybersquatting is a civil matter, not a criminal one. There is a good reason that cybersquatting is a civil matter... more

CEO Chehade, Senator Cruz, and the IANA Transition End Game

On February 4, 2016, U.S. Senator (and Republican Party Presidential nomination contender) Ted Cruz, joined by Senators James Lankford and Michael Lee, dispatched a letter to ICANN CEO Fadi Chehade stating that "we were surprised and dismayed to learn that you have agreed to co-chair a high-level advisory committee for the World Internet Conference, which is organized by the Chinese government, while you serve as the Chief Executive Officer of ICANN under contract with the United States Government". The letter continued by posing a series of nine questions... more

Romney Emails Hacked

US presidential candidate Mitt Romney will likely be reconsidering his email passwords after his online email account was reportedly hacked. A hacker claims to have accessed Romney's Hotmail and Dropbox accounts after guessing the answer to the Republican candidate's 'favourite pet' security question. It's suspected Romney used the same password for more than one account. more

Representatives From EU, NATO, USA, Japan, Australia Hold Meeting on 5G Security and Policy Measures

Representatives from over 30 countries including nations from European Union, NATO, United States, Germany, Japan, Israel and Australia participated in the Prague 5G Security Conference this week. more

The Internet Association Releases Letter Backing Senate Effort to Reinstate Net Neutrality Rules

The Internet Association (IA) whose members include the likes of Google, Amazon and Facebook, on Thursday issued a letter addressed to Senate Majority Leader Mitch McConnell (R-Ky.) and Minority Leader Charles Schumer (D-N.Y.) in support of the reinstatement of FCC rules. more

EU Approval for 4G Technologies to Use GSM Bands - A Boost to Rural Mobile Broadband

The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more

No Cyberattack on Wall Street

In case you missed it, last Thursday, May 6, we saw a remarkable day on the stock markets. The day started off with some selling which went down neat and orderly. Suddenly, around 2:40 pm eastern time, the market started selling off rapidly taking huge hits in in the span of 30 minutes. It was an incredible ride and at one point, the Dow Jones average was off 1000 points for the day, the largest drop in history (though not the largest percentage drop). It was kind of like October of 1987. more

Who Owns Your Connected Device?

It's been clear for years that IoT companies gather a large amount of data from customers. Everything from a smart thermometer to your new car gathers and reports data back to the cloud. California has tried to tackle customer data privacy through the California Consumer Privacy Act that went into effect on January 1. Web companies must provide California consumers the ability to opt-out from having their personal information sold to others. more

EURid Releases 74,000 Disputed Names

EURid has unfrozen 74,000 domains that were part of a dispute against domain warehousers. In July, EURid relented to outside pressure as it suspended the registration of 74,000 domains. They claimed these domains were registered directly by three registrars, not on behalf of clients, which violated EURid's terms. But the registrars have won this round... more

FCC Clears SpaceX, T-Mobile Deal to Expand Coverage to Dead Zones

The Federal Communications Commission (FCC) has granted T-Mobile and SpaceX approval to extend mobile coverage to remote areas using satellite technology. This marks the first authorization of its kind, allowing collaboration between a wireless carrier and a satellite operator to utilize spectrum bands traditionally reserved for terrestrial services. more

New Ad Fraud Schemes Utilize Alpha-Numeric Domains

The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more