/ Most Viewed

Automated Web Application Attacks Can Peak at 25,000 an Hour

Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to the newly released Imperva Web Application Attack Report. Report also notes that when websites came under automated attack they received up to 25,000 attacks in one hour, or 7 attacks every second. more

Recent Case in Federal Court Shows Inefficiencies of Anticybersquatting Consumer Protection Act

A recent case1 from a federal court in Kentucky shows why the Anticybersquatting Consumer Protection Act (15 U.S.C. 1125(d) - the "ACPA") can be - when compared to the Uniform Domain Name Dispute Resolution Policy ("UDRP") - a relatively inefficient way of resolving a domain name dispute. Here is a quick rundown of the facts. Defendant owned a business directly competitive to plaintiff ServPro. Plaintiff had used its mark and trade dress since the 1960's... more

Senate Bill to Reverse FCC Decision to Repeal Net Neutrality Received Its 30th Co-Sponsor

A Senate bill that would reverse the Federal Communications Commission's (FCC) decision to repeal Net Neutrality received its 30th co-sponsor today, ensuring it will receive a vote on the Senate floor. more

Google Offers Free DDoS Protection for News Sites

Google has announced its first initiative out of Jigsaw which is the expansion of its experimental service, Project Shield. Google is offering Project Shield as a free service leveraging Google technology to protect news and free expression sites from DDoS attacks on the web. more

Net Neutrality Advocates Planning Two Days of Protest in Washington DC

A coalition of activists and consumer groups are planning to gather in Washington, DC to meet directly with the members of Congress, which is said to be the "most effective way to influence their positions and counter the power of telecom lobbyists and campaign contributions." more

Iran Gives Messaging Apps a Year to Move Data Inside Country

Iran has given foreign messaging apps a year to move data they hold about Iranian users onto servers inside the country, prompting privacy and security concerns on social media. more

8 Facts About 3-Member Panels in UDRP Cases

Proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP) can be heard by either a one- or three-member panel. Here are eight important facts that every complainant (trademark owner) and respondent (domain name registrant) should consider when deciding whether to select one or three members... Either party - complainant or respondent - has an opportunity to select a three-member panel... more

Annual Review of .fr ccTLD, With Growth of +6% in 2021

Like 2020, the year 2021 saw exceptional conditions, with the persistence of the health crisis. As the registry for the .FR TLD, Afnic was well placed to observe the adaptation of French society to these exceptional conditions, particularly from the viewpoint of the digital transition process. Following on from a historical record in .fr domain name creations in 2020 (793,441), the 776,514 in 2021 have confirmed the take-up of digital benefits by French users, with registrations still up 12% as compared to 2019. more

NANOG’s Edward Mc Nair to Deliver Keynote Address at CaribNOG 17 in April

Edward Mc Nair will deliver the keynote address at the next regional meeting of the Caribbean Network Operators Group (CaribNOG), to be held in Bridgetown, Barbados from April 10 to 12. The featured talk will take place on Thursday 11 April at 9 am AST. A live netcast will be available. Mc Nair is the Executive Director of the North American Network Operators Group (NANOG). more

Trust Binding

A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more

US Department of Commerce Reports on Open Internet, Privatization of DNS

Report form U.S. Department of Commerce: "Enabling Growth and Innovation in the Digital Economy" ... "The report articulates the Department of Commerce’s philosophy for digital economy policymaking and demonstrates the many ways in which the Department has pursued its policy agenda consistent with that philosophy." –Penny Pritzker, U.S. Secretary of Commerce more

CAICT Holds ICANN 58 China Internet Community Readout Session

In the afternoon of March 29, the CAICT held the ICANN 58 China Internet Community Readout Session in the CAICT together with the ICANN Beijing Engagement Center. Mr.Li Xiangning, Deputy Director General of Information and Communication Administration under the Ministry of Industry and Information Technology (MIIT), attended the event and gave a speech on the meeting. Over 60 representatives from related governmental agencies including the Office of the Central Leading Group for Cyberspace Affairs, the Ministry of Foreign Affairs and Beijing Communications Administration, domain name registries and registrars, industrial organizations, institutes and universities participated in the seminar. more

Carlton: ICANN TLD Expansion to “Increase Output, Lower Price and Increase Innovation”

According to the latest update from ICANN related to the introduction of new generic Top-Level Domains (gTLDs), Dr. Dennis Carlton has reiterated that the planned introduction of new gTLDs will not burden trademark owners with additional defensive registrations. Carlton writes: "I conclude that ICANN's proposed framework for introducing new gTLDs is likely to facilitate entry and create new competition to the major gTLDs such as .com, .net, and .org. Like other actions that remove artificial restrictions on entry, the likely effect of ICANN's proposal is to increase output, lower price and increase innovation. This conclusion is based on the fundamental principles that competition promotes consumer welfare and restrictions on entry impede competition." more

Internet Association Meets With the FCC In Efforts to Preserve Net-Neutrality Rules

Jon Brodkin reporting in Ars Technica: "Federal Communications Commission Chairman Ajit Pai and his staff met yesterday with the Internet Association, a trade group whose members include Amazon, Dropbox, eBay, Facebook, Google, Microsoft, Netflix, PayPal, Reddit, Spotify, Twitter, and about 30 other Web companies. The meeting occurred about a week after Pai reportedly met with broadband industry lobby groups to discuss his plans for eliminating net neutrality rules." more

DCA Trust Strongly Urges ICANN Board Not to Adopt the Proposed Amendment to Its Bylaw

ICANN has been busy in managing several parallel processes that are also closely tied together in one way or the other. The processes include the new gTLD process, the IANA transition and most currently and important action yet that would act as the synergizing factor is the accountability process. ICANN has also posted for public comment proposed Bylaws revisions that would incorporate a higher voting threshold for the Board to determine not to follow the advice of the Governmental Advisory Committee. more