/ Most Viewed

What Is the Uniform Rapid Suspension System (URS) and What Is It Good For?

The Internet Corporation for Assigned Names and Numbers (ICANN) launched the Uniform Rapid Suspension System (URS) (2013) in anticipation of the marketing of new gTLDs that became available from November 2013. It is one of four new rights protection mechanisms (RPMs) designed to combat cybersquatting. It is not intended for legacy gTLDs, and for new TLDs, it is planned only for that class of dispute colloquially referred to as a "slam dunk." more

ICANN and the Data Quality Act: Part III

This is the third part of a multi-part series reported by ICANNfocus. In this part, the focus is on how ICANN implementation of the Data Quality Act would address congressional concerns. "Congress is deeply concerned by ICANN's management and is demanding meaningful change in how the organization governs the internet. Congressional concerns regarding ICANN and Congressional oversight activities were detailed in Part II of this series." more

ICANN Assigns Tor’s .Onion TLD as Special-Use Domain Name

The Internet Engineering Task Force has approved a Draft RFC for "The .onion Special-Use Domain Name" by the Tor Project, the provider of online anonymity and privacy services. more

Turning the Tide of Online Scams: Interview With Prof. Jorij Abraham, Global Anti-Scam Alliance

Professor Jorij Abraham has been a part of the international eCommerce community since 1997. From 2013 -- 2017, he has been Director of Research & Advise at Thuiswinkel.org (the Dutch Ecommerce Association) and the European Ecommerce Association with 25.000+ members in 20 countries. He is now Managing Director of Global Anti-Scam Alliance, whose mission is to protect consumers from getting scammed. He is also e-commerce professor at the University of Applied Sciences, TIO. more

Lessons Learned from Harvey and Irma

One of the most intense natural disasters in American history occurred last week...You may wish to donate or get involved with hurricane Harvey relief to help the afflicted. That's great, but as we all know, we should be wary of who we connect with online... The FTC warned last week that there are many active relief scams in progress and noted that there always seems to be a spike in registration of bogus domains. more

Kudos to ccTLD Registries for Taking Measures to Improve Security

When I first wrote about Domain Registry Locking over a year and a half ago, Verisign was the only Registry offering a true Registry Lock Service. Of course, not long after, Neustar announced their Registry Lock Service too. Recently however, a number of ccTLD Registries have also adopted Registry Locking programs... more

IPv6 Will Change the Face of Email Filtering, Says Report

Data solutions provider Return Path has released a new report highlighting 20 visionary ideas for brands to "futureproof" their email program. Among various insights, the report warns brands that adoption of IPv6 will result in rising dependency on domain-based reputation. more

Dot-XXX and Tiered/Differential Pricing: Permitted?

As folks will recall, there was a big debate about tiered/differential pricing in the .biz/info/org contracts. Eventually those contracts were amended to prevent that. However, if folks read the .XXX proposed contractv [PDF], Appendix S, Part 2, under "delegated authority" (page 66 of the PDF), appears to give the Registry Operator total control to make policy regarding pricing. Thus, it would appear they are in a position to re-price domains that later become successful... more

Quintessential and Other Acts of Bad Faith in Acquiring Domain Names

There are two essential differences between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA), one procedural and one substantive. The procedural difference is quite minor, a mere quirk that Panels adopted by consensus in the early days of the UDRP and deserves no more than a footnote. Under the UDRP, complainants have standing on proof that they have trademark rights when they file their complaints... more

Old New Telco Thinking

Ahh, so the telecom incumbents have come up with a "new" idea for the Internet -- usage-based pricing. That's right, more usage (for things like VOIP and video especially) means more costs to operate the network, so users should pay by the bit, or some similar metric. It's all so logical! But wait a minute. I thought what sparked the consumer Internet revolution was the fact that ISPs didn't charge by the minute, but offered flat-rate monthly fees. And what catalyzed the boom in cellular usage here in the US was the shift from heavily usage-based pricing to the largely flat rates we see today... more

ICANN.WTF? FTC & OCA Asked Whether .SUCKS is a Law Breaker (Part I)

On April 9, 2015 ICANN took the unprecedented step of asking two national consumer protection agencies whether the .Sucks registry, one of the new gTLDs it has approved and which is currently in its sunrise registration period, has a business plan which violates any laws or regulations those agencies enforce. This is the equivalent of sending a message stating, "Dear Regulator: We have lit a fuse. Can you please tell us whether it is connected to a bomb?" more

Hackers Use Tesla’s Amazon Cloud Account to Mine Cryptocurrency

Tesla's cloud environment has been infiltrated by hackers and used to mine cryptocurrencies, researchers have discovered. Other victims include Aviva and Gemalto. more

From Toad to Princess - New TLDs Are No Magical Wand in the Kingdom of Search Engines

Google has posted details on Ranking of new gTLDs (new gTLDs) in search. John Mueller, Webmaster Trends Analyst, said that new gTLD's will be treated the same as other gTLD's such as .com. He stated: "Overall, our systems treat new gTLDs like other gTLDs (like .com & .org). Keywords in a TLD do not give any advantage or disadvantage in search." The ambiguous use of the word "overall" in the statement, may leave some doubt as to whether the 600 .brands -- new domain extensions operated by brand owners -- are included or excluded in any VIP search ranking treatment. more

Phishing: An Interesting Twist on a Common Scam

After Two Security Assessments I Must Be Secure, Right? Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final report came in, your company was given a clean bill of health. At first, you felt relieved, and confident in your security measures. Shortly thereafter, your relief turned to concern. ...Given you're skepticism, you decide to get one more opinion. ...And the results were less than pleasing. more

P2P as a New Spam Medium, Moving From PoC to Full Operations

Spam on P2P networks used to be mainly with advertising inside downloaded movies and pictures (mainly pornographic in nature), as well as by hiding viruses and other malware in downloaded warez and most any other file type (from zip archives to movie files). Further, P2P networks were in the past used for harvesting by spammers. Today, P2P has become a direct to customer spamvertizing medium. This has been an ongoing change for a while. As we speak, it is moving from a proof of concept trial to a full spread of spam, day in, day out... more