Mozilla says that the FCC shouldn't look at an Internet line only as a relationship between an Internet provider and a subscriber. Regulators should formally recognize that there's a third party involved: Content providers such as websites, apps, gaming and more, Mozilla says. more
It seems necessary to publicly address the arguments posed in "Stop Obama's Internet Giveaway" by L. Gordon Crovitz of the Wall Street Journal. If, as Crovitz suggested, the President were truly "giving away the Internet," there would be mass outrage. After all, the Internet has become a primary driver of global commerce. Internet users, businesses, civil society members and Internet operators have come together to approve a set of proposals to make the Internet stronger and more open. more
In a previous blog post I mentioned that the FCC had taken away restrictions to allow broadband supplied by E-Rate funding to be used to provide free WiFi for the public. That's a good idea that will provide some relief for areas with little or no other broadband. But the announcement raises a more fundamental question - why was such a restriction in place to begin with? more
The Obama administration's proposals to regulate the Internet according to common carrier rules have set off a storm of opposition from carrier interests, whose scale and reach have been impressive. The arguments they muster are fatuous and deceitful. The Internet is not what the carriers own or have created; the Internet is what they seek to extract money from. "Regulating the Internet" is not the issue; regulating the carriers is. more
In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. more
A new cybersecurity company called Chronicle has emerged from Alphabet's "moonshot factory," that's dedicated to helping companies find and stop cyberattacks before they cause harm. more
Under the previous rules for the Uniform Domain Name Dispute Resolution Policy (UDRP), domain name registrants that had a complaint filed against them were supposed to be notified of the complaint by the trademark owner that filed it. Then, a revised set of UDRP rules that went into effect in 2015 eliminated the complainant's obligation to notify the respondent. Instead, the new rules only require the UDRP service provider (such as WIPO or the Forum) notify the respondent, presumably after the registrar has locked the domain name, preventing any transfers. more
Worldwide internet traffic plunged by around 40% as Google services suffered a complete black-out, according to web analytics experts. The tech company said all of its services from Google Search to Gmail to YouTube to Google Drive went down for between one and five minutes on Friday. more
Over the past weeks, communities gathering experts from government, business, Civil Society, and the academic and technical communities, have been working through open mailing lists and online virtual meetings on IGF Best Practices. The discussion was documented by independent experts that will feed into five 90 minute Forums in Istanbul and that will in turn report into a Best Practices Main Session. more
Although including multiple domain names in a single UDRP complaint can be a very efficient way for a trademark owner to combat cybersquatting, doing so is not always appropriate. One particularly egregious example involves a case that originally included 77 domain names -- none of which the UDRP panel ordered transferred to the trademark owner, simply because consolidation against the multiple registrants of the domain names was improper. more
"The non-profit that runs all .org domains and provides the bulk of the funding for the Internet Society and Internet Engineering Task Force has just saved itself millions of dollars a year," reports Kieren McCarthy in The Register. more
Council on Foreign Relations has released a brief today authored by Megan Stifel, former director for international cyber policy at the U.S. National Security Council in the Obama administration, urging Trump administration to not back away from the IANA transition and to instead invest in the multistakeholder process. more
NIST's release of their initial public draft of SP 800-137, Guide for Continuous Monitoring of Information Systems and Organizations will create a set of challenges for the federal cybersecurity community. Agencies and contractors will need to shape the document through the multi-stage revision process while continuing to implement their own continuous monitoring measures. more
In the upcoming Black Hat London presentation, security researcher from University College London, Vasilios Mavroudis and colleagues are going to describe and demonstrate the practical security and privacy risks that arise with the adoption systems enabled with ultrasonic cross-device tracking (uXDT). more
Cybercriminals are continuing to exploit human nature and relying on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is demanded, according to Verizon 2016 Data Breach Investigations Report released today. more