/ Most Viewed

Hackers in Possession of Over 312K Files, 516GB Financial Data of Some of World’s Largest Companies

A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more

Why I Wrote ‘Thinking Security’

I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more

ICANN CSG and NCSG Make Progress at ICANN81

The Commercial Stakeholder Group and Non-Commercial Stakeholder Group (together, the Non-Contracted Party House, or NCPH) met for a daylong Day 0 session on 8 November 2024, immediately prior to the opening of the ICANN81 meeting in Istanbul. This meeting follows one of a similar nature conducted prior to ICANN78 in Hamburg, which was the first joint NCPH meeting following the pandemic. more

Improvements in Undersea Fiber

We often forget that a lot of things we do on the web rely on broadband traffic that passes through undersea cables. Any web traffic from overseas gets to the US through one of the many underwater fiber routes. Like with all fiber technologies, the engineers and vendors have regularly been making improvements. The technology involved in undersea cables is quite different than what is used for terrestrial fibers. A long fiber route includes repeater sites where the light signal is refreshed. Without repeaters, the average fiber light signal will die within about sixty miles. more

Uncivil Society: The NETmund*al *n*t*at*ve’s Missing I’s

When I last wrote about the NETmundial Initiative (NMI) project developed by the World Economic Forum (WEF) in conjunction with ICANN it was noted that its August 28th announcement event "ended with significant dissent from the broad groups comprising "civil society", and only lukewarm support from the business sector". Indeed, during the concluding session on that late summer day, "NTIA head Larry Strickling appeared to startle the participants when he intervened to observe that perhaps the event was over-engineered... more

Apple Rumored Building Its Own CDN, Negotiating Paid Interconnect Deals With ISPs

Apple has reportedly formed a new internal group to work on building out their own content delivery network (CDN) to deliver Apple software updates, apps and other Apple related content. more

Court’s Analysis in ACPA Case Is Instructive on How to Plead Bad Faith Domain Name Registration

NameFind is a GoDaddy company that holds registrations of domain names and seeks to make money off of them by placing pay-per-click ads on parked pages found at the domain names. Global Licensing owns the DEJA VU trademark that is used in connection with strip clubs and other adult-related services. When NameFind used the domain name dejavushowgirls.com to set up a page of pay-per-click ads, Global Licensing sued, raising claims under the federal Anticybersquatting Consumer Protection Act (ACPA), 15 U.S.C. 1125(d). more

Microsoft’s Datacenter in Wyoming Powered Entirely by Wind Energy

Microsoft has announced the purchase of its largest wind energy to date -- 237 megawatts of wind energy -- which will in turn allow its datacenter in Cheyenne, Wyoming to be powered entirely by wind power. more

The Other Side of Security

The Denver edition of Security BSides took place a few weeks ago in a garage turned art gallery on the far end of Denver's emerging Santa Fe Arts District, right on the border between historic working-class neighborhoods and a rambling wasteland of building supply warehouses. ... The presentation I enjoyed most was "Top 10 Ways IT is Enabling Cybercrime," presented by Daniel J. Molina from Kaspersky Labs. He described how quickly threats are evolving, how many new threats are appearing every day, and explained that the targets aren't always who you'd expect. more

Access to Safe and Affordable Prescription Medications Online is a Human Right

I recently served on a panel at the Toronto RightsCon 2018 conference (Making Safe Online Access to Affordable Medication Real: Addressing the UN Human Rights resolution for access to essential medicines), where I represented the perspective of Americans struggling to afford their daily medications and desperate to have safe, affordable Internet access to their prescriptions. more

Wait and See Approach on Abuse

Wait and see approach on abuse attracts ICANN Stakeholder attention: A few weeks ago I made a detailed argument as to why product safety applies to domains, just like it does to cars and high chairs. I also argued that good products equal good business or "economically advantaged" in the long run. Then I really made a strong statement, I said if we don't actively engage other Internet stakeholders -- those that interact with our products, we would eventually lose the opportunity to self-regulate. more

The Issue of License Proliferation

When I was on the ICANN board, we were dealing with the issue of Internationalized Domain Names (IDNs), an initiative to allow non-latin characters in domain names. Technically, it was difficult and even more difficult was the consensus process to decide exactly how to do it. Many communities like the Chinese and Arabic regions were anxious to get started and were getting very frustrated with the ICANN process around IDNs. ... When I joined the Open Source Initiative board of directors, we were also struggling with a similar, but slightly different problem. more

Important Progress on Accountability and Transparency

The ICANN Board made a couple of important decisions regarding accountability and transparency at its 8 December meeting. Specifically, it approved compensating Directors and also enhanced ICANN's conflicts of interest rules. These are positive developments for the organization, and come at a critical juncture as the Internet governance debate heats up in 2012. more

Swedish National Defense Radio Agency to Wiretap All Internet Traffic

Several people abroad have started mailing me and others asking if rumors of new legislation to be passed in Sweden on the 17th of June is for real. There are also reports in international forums starting to pop up. This is fairly old news, and I think that most of us are surprised that this has not generated more press both inside and outside Sweden earlier. This legislation will allow for the Swedish National Defense Radio Agency (FRA) to wiretap Internet traffic leaving the country... more

Principles, Factors, and Elements that Promote or Undermine the Outcome of UDRP Cases

Panels adjudicating cybersquatting claims, defenses, and rebuttals under the Uniform Domain Name Dispute Resolution Policy (UDRP) expect parties to prove their contentions, and this means having a working understanding of what this entails. There is, first, a set of fundamental rules or principles -- such as pending applications for a mark do not constitute a right, or recognizing unregistered marks as constituting rights... more