/ Most Viewed

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

SEC Asks Companies to Disclose Cyberattacks

I came across an interesting article on Reuters today: "U.S. securities regulators formally asked public companies for the first time to disclose cyber attacks against them, following a rash of high-profile Internet crimes..." This is a pretty big step for the SEC. Requiring companies to disclose when they have been hacked shifts the action on corporations from something voluntary to something that they have to do. The question is do we want to hear about everything? more

Understanding the Brazilian Court Decision to Arrest Google’s Representative

Brazil has been on the news lately, and not for good reasons: an electoral judge order the arrest of Google's Director in Brazil for not complying with a court decision that ordered the removal a YouTube video with allegedly defamatory content. A lot has been said about this, but it seems that many people got it wrong, so let's recap some of the misinterpretations that circulated, specially those at the EFF website. more

CEO Chehade, Senator Cruz, and the IANA Transition End Game

On February 4, 2016, U.S. Senator (and Republican Party Presidential nomination contender) Ted Cruz, joined by Senators James Lankford and Michael Lee, dispatched a letter to ICANN CEO Fadi Chehade stating that "we were surprised and dismayed to learn that you have agreed to co-chair a high-level advisory committee for the World Internet Conference, which is organized by the Chinese government, while you serve as the Chief Executive Officer of ICANN under contract with the United States Government". The letter continued by posing a series of nine questions... more

Networks and States: The Global Politics of Internet Governance (Milton Mueller, NYU 12/14)

The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more

Confusing Similarity of Domain Names is Only a ‘Standing Requirement’ Under the UDRP

WIPO's newest overview of the Uniform Domain Name Dispute Resolution Policy (UDRP) succinctly states what decisions have made clear through the years: The UDRP's first test is only a "standing requirement." Standing, under the law, simply means that a person or company is qualified to assert a legal right. It does not mean or imply that one will necessarily prevail on any claims. The UDRP includes a well-known three-part test that all trademark owners must satisfy to prevail, but the first element has a low threshold. more

ICANN vs. the Federal Reserve

The Internet is about to go independent. After years of support and supervision, the U.S. Government is about to irrevocably relinquish its control over the Internet by transferring its authority to an independent corporation named ICANN. As part of this push, the current chairman of ICANN posted this article to the Wall Street Journal... What's truly amazing about this piece, is how well it's done... It was only after digesting this piece, that I remembered we are talking about ICANN here. more

The Tale of Thousands of Hacked Modems in Brazil, Affecting Millions

Kaspersky Lab Expert, Fabio Assolini, has provided detailed description of an attack which as been underway in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, affecting 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems. more

ICANN to Manage Internet Time Zone Database

The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that it has taken over operation of an Internet Time Zone Database that is used by various major computer systems. ICANN agreed to manage the database after receiving a request from the Internet Engineering Task Force (IETF). The database contains time zone code and data that computer programs and operating systems such as Unix, Linux, Java, and Oracle rely on to determine the correct time for a given location. Modifications to the database occur frequently throughout the year. more

Satellite Spectrum Showdown: Musk’s Starlink vs. Ambani’s Reliance Jio in the Race for India’s Broadband Future

Elon Musk's quest to expand his Starlink satellite broadband service into India faces significant pushback from Mukesh Ambani, Asia's wealthiest individual and head of Indian telecom giant Reliance Jio. more

Stealth Cyberattacks by China’s Volt Typhoon Threaten U.S. Infrastructure: Microsoft Unmasks Espionage Campaign

Microsoft today disclosed the detection of covert and targeted malicious activity aimed at critical infrastructure organizations in the United States. The attack is orchestrated by a state-sponsored group from China, known as Volt Typhoon, with the suspected objective of disrupting the communication infrastructure between the U.S. and Asia during potential future crises. more

ICANN to Release Hundreds of Domain Names Matching Country Names

Hundreds of country and territory domain names are likely to be finally released this year based on the new resolution that calls for ICANN to take "all steps necessary" to do so. more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

Cuba Claims New Regulations Expand Internet Access to Homes and Businesses, But Here’s the Downside

New Cuban regulations regarding private WiFi networks went into effect yesterday, and the New York Times and others proclaimed that "Cuba expands Internet access to private homes and businesses." Yes, Cubans can legally import and install WiFi routers in their homes, small cafes, B&Bs, etc., but these regulations will make little difference in Internet access. more

The Over-Optimization Meltdown

In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more