| News Briefs Canada Becoming the New Cybercrime Hub, Quickly Replacing China, Eastern Europe May 10, 2011 - Include Your Comments Microsoft to Acquire Skype May 10, 2011 - Include Your Comments European Commissioner Asks for Further Delay on .XXX May 05, 2011 - Include Your Comments Escalating US, Chinese Silent War on the Internet May 05, 2011 - Include Your Comments China Sets Up Internet Oversight Body, Has Authority to Investigate and Punish May 05, 2011 - Include Your Comments Featured Blogs Understanding the Modern DDoS Threat The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more » May 10, 2011 - by Gunter Ollmann - Comments: 0 Related Topics: Cyberattack, Cybercrime, Security IPv6 RIPEness: One Year Later A year ago, the RIPE NCC introduced IPv6 RIPEness -- a system that rates IPv6 deployment of Local Internet Registries (LIRs)... Now, one year later, the numbers have gone up... In absolute numbers: more than 3,000 LIRs have IPv6 address space. This means that the RIPE NCC has made more than 1,100 IPv6 allocations within 12 months. more » May 10, 2011 - by Daniel Karrenberg - Comments: 0 Related Topics: Access Providers, DNS, Registry Services, IP Addressing, IPv6 Creating, Protecting and Defending Brand Equity - Part 3 In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more » May 10, 2011 - by Joshua Braunstein - Comments: 0 Related Topics: Cybersquatting, Domain Names, Malware The End of the "Skype as Bandit" Era And so it ends... Skype was always always a fun company to write about because they were always a bit of a rogue. The scrappy little startup that took on the megacorps of the telecom industry... and won in so many ways... look at their leading % of international calls... or the fact that per-minute call costs are now very clearly being commoditized down to zero... more » May 10, 2011 - by Dan York - Comments: 0 Related Topics: P2P, VoIP Responsibilities of the DNS: "Oh YES you will!", "Oh NO you will not!" What is the responsibility of the DNS? Should the DNS be responsible for policing traffic across its infrastructure? Should the blocking and blacklisting of names or throttling of query packets be the responsibility of the DNS? From experience I know my opening paragraph has started passionate debates in more than one section of this globe. We at CommunityDNS have found ourselves right in the middle of such heated debates. "Oh YES you will!", "Oh NO you will not!" more » May 09, 2011 - by Chuck Kisselburg - Comments: 0 Related Topics: Cyberattack, Cybercrime, DNS, DNSSEC, Security Why Isn't Mobile Malware More Popular? This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more » May 09, 2011 - by Suresh Ramasubramanian - Comments: 0 Related Topics: Access Providers, Cyberattack, Cybercrime, Malware, Mobile, P2P, Security Defending the Network Several Times Over Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more » May 09, 2011 - by James Harris - Comments: 0 Related Topics: Cyberattack, Cybercrime, Malware, Security, Web The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more » May 09, 2011 - by Wout de Natris - Comments: 1 Related Topics: Cyberattack, Cybercrime, Email, Internet Governance, Malware, Mobile, Security, Spam, Telecom The Internet Lost in Translation In 1949 a Bell Laboratory researcher, Claude Shannon, published a paper on a new science of "Information". Bell Labs had sponsored the research with the goal of improving phone networks but was not prepared to embrace the full implications of the new science which made explicit the distinction between information in the information sense and information encoded in numbers or bits... more » May 06, 2011 - by Bob Frankston - Comments: 0 Related Topics: Telecom Slippery Slope Last week, I visited Budapest to deliver a speech at the ICANN Studienkreis, an annual conference where experts study and address some current issues relating to Internet governance. I discussed how the Internet is on a slippery slope. Starting with the legitimate concern over how to deal with cybersquatters, we have moved to an unreasonable focus on legal control of Internet content and the domain name system. more » May 06, 2011 - by David Maher - Comments: 0 Related Topics: Domain Names, Registry Services, ICANN, Internet Governance, Law, Policy & Regulation In DHS Takedown Frenzy, Mozilla Refuses to Delete MafiaaFire Add-On Not satisfied with seizing domain names, the Department of Homeland Security asked Mozilla to take down the MafiaaFire add-on for Firefox. Mozilla, through its legal counsel Harvey Anderson, refused. Mozilla deserves thanks and credit for a principled stand for its users' rights. more » May 06, 2011 - by Wendy Seltzer - Comments: 0 Related Topics: Censorship, Domain Names, Law May's G8 Summit Can Help or Hurt the Internet The more useful the Internet becomes, the more people focus on how to run it. It is no secret that the subject is addressed in many forums today, some with powers to regulate, some with powers to persuade (and one or two with powers only to confuse). Worse, as Internet access becomes the star player in scenes of political reformation, economic growth, and delivery of citizen services, ever more countries are keen to consider how, and if, it should be governed. more » May 06, 2011 - by Gregory Francis - Comments: 0 Related Topics: Internet Governance Creating, Protecting and Defending Brand Equity - Part 2 In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more » May 05, 2011 - by Joshua Braunstein - Comments: 0 Related Topics: Cybersquatting, Domain Names, Law | Hot Topics • Top-Level Domains • Security • Domain Names • Internet Governance • ICANN • Registry Services • Policy & Regulation • Cybercrime • IP Addressing • DNS • Malware • Cyberattack • more... Industry Updates BlueCat Networks Sets Industry Standard with 5-Hour On-Site Repair for IP Address Management, DNS May 04, 2011 - by BlueCat Networks MarkMonitor to Co-Chair International Anti-Counterfeiting Coalition Spring Conference May 03, 2011 - by MarkMonitor How a .COM Can Also be a .ORG: Open Compute Project May 03, 2011 - by PIR CentralNic, .US.ORG Reserve Olympics Trademark to Protect Against Cybersquatters and Brand Abuse Apr 29, 2011 - by CentralNic .CO Registry to Expand Exclusive List of Accredited Registrars Apr 26, 2011 - by .CO Internet Advertise on CircleID If your advertising and marketing objectives entail reaching high-ranking experts and professionals within the IT and Internet industry, CircleID can help you achieve it. Find Out More... |
No comments:
Post a Comment
Keep a civil tongue.