Sponsor

2011/05/11

CircleID Weekly Wrap for 2011-05-11

CircleID

INTERNET INFRASTRUCTURE   .   WEEKLY WRAP: May 04, 2011 - May 11, 2011

News Briefs

Canada Becoming the New Cybercrime Hub, Quickly Replacing China, Eastern Europe
May 10, 2011  -  Include Your Comments

Microsoft to Acquire Skype
May 10, 2011  -  Include Your Comments

European Commissioner Asks for Further Delay on .XXX
May 05, 2011  -  Include Your Comments

Escalating US, Chinese Silent War on the Internet
May 05, 2011  -  Include Your Comments

China Sets Up Internet Oversight Body, Has Authority to Investigate and Punish
May 05, 2011  -  Include Your Comments


Featured Blogs

Understanding the Modern DDoS Threat
The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more »
May 10, 2011  -  by Gunter Ollmann  -  Comments: 0
Related Topics: Cyberattack, Cybercrime, Security

IPv6 RIPEness: One Year Later
A year ago, the RIPE NCC introduced IPv6 RIPEness -- a system that rates IPv6 deployment of Local Internet Registries (LIRs)... Now, one year later, the numbers have gone up... In absolute numbers: more than 3,000 LIRs have IPv6 address space. This means that the RIPE NCC has made more than 1,100 IPv6 allocations within 12 months. more »
May 10, 2011  -  by Daniel Karrenberg  -  Comments: 0
Related Topics: Access Providers, DNS, Registry Services, IP Addressing, IPv6

Creating, Protecting and Defending Brand Equity - Part 3
In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more »
May 10, 2011  -  by Joshua Braunstein  -  Comments: 0
Related Topics: Cybersquatting, Domain Names, Malware

The End of the "Skype as Bandit" Era
And so it ends... Skype was always always a fun company to write about because they were always a bit of a rogue. The scrappy little startup that took on the megacorps of the telecom industry... and won in so many ways... look at their leading % of international calls... or the fact that per-minute call costs are now very clearly being commoditized down to zero... more »
May 10, 2011  -  by Dan York  -  Comments: 0
Related Topics: P2P, VoIP

Responsibilities of the DNS: "Oh YES you will!", "Oh NO you will not!"
What is the responsibility of the DNS? Should the DNS be responsible for policing traffic across its infrastructure? Should the blocking and blacklisting of names or throttling of query packets be the responsibility of the DNS? From experience I know my opening paragraph has started passionate debates in more than one section of this globe. We at CommunityDNS have found ourselves right in the middle of such heated debates. "Oh YES you will!", "Oh NO you will not!" more »
May 09, 2011  -  by Chuck Kisselburg  -  Comments: 0
Related Topics: Cyberattack, Cybercrime, DNS, DNSSEC, Security

Why Isn't Mobile Malware More Popular?
This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more »
May 09, 2011  -  by Suresh Ramasubramanian  -  Comments: 0
Related Topics: Access Providers, Cyberattack, Cybercrime, Malware, Mobile, P2P, Security

Defending the Network Several Times Over
Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more »
May 09, 2011  -  by James Harris  -  Comments: 0
Related Topics: Cyberattack, Cybercrime, Malware, Security, Web

The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones
At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more »
May 09, 2011  -  by Wout de Natris  -  Comments: 1
Related Topics: Cyberattack, Cybercrime, Email, Internet Governance, Malware, Mobile, Security, Spam, Telecom

The Internet Lost in Translation
In 1949 a Bell Laboratory researcher, Claude Shannon, published a paper on a new science of "Information". Bell Labs had sponsored the research with the goal of improving phone networks but was not prepared to embrace the full implications of the new science which made explicit the distinction between information in the information sense and information encoded in numbers or bits... more »
May 06, 2011  -  by Bob Frankston  -  Comments: 0
Related Topics: Telecom

Slippery Slope
Last week, I visited Budapest to deliver a speech at the ICANN Studienkreis, an annual conference where experts study and address some current issues relating to Internet governance. I discussed how the Internet is on a slippery slope. Starting with the legitimate concern over how to deal with cybersquatters, we have moved to an unreasonable focus on legal control of Internet content and the domain name system. more »
May 06, 2011  -  by David Maher  -  Comments: 0
Related Topics: Domain Names, Registry Services, ICANN, Internet Governance, Law, Policy & Regulation

In DHS Takedown Frenzy, Mozilla Refuses to Delete MafiaaFire Add-On
Not satisfied with seizing domain names, the Department of Homeland Security asked Mozilla to take down the MafiaaFire add-on for Firefox. Mozilla, through its legal counsel Harvey Anderson, refused. Mozilla deserves thanks and credit for a principled stand for its users' rights. more »
May 06, 2011  -  by Wendy Seltzer  -  Comments: 0
Related Topics: Censorship, Domain Names, Law

May's G8 Summit Can Help or Hurt the Internet
The more useful the Internet becomes, the more people focus on how to run it. It is no secret that the subject is addressed in many forums today, some with powers to regulate, some with powers to persuade (and one or two with powers only to confuse). Worse, as Internet access becomes the star player in scenes of political reformation, economic growth, and delivery of citizen services, ever more countries are keen to consider how, and if, it should be governed. more »
May 06, 2011  -  by Gregory Francis  -  Comments: 0
Related Topics: Internet Governance

Creating, Protecting and Defending Brand Equity - Part 2
In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more »
May 05, 2011  -  by Joshua Braunstein  -  Comments: 0
Related Topics: Cybersquatting, Domain Names, Law


Hot Topics

Top-Level Domains
Security
Domain Names
Internet Governance
ICANN
Registry Services
Policy & Regulation
Cybercrime
IP Addressing
DNS
Malware
Cyberattack
more...


Industry Updates

BlueCat Networks Sets Industry Standard with 5-Hour On-Site Repair for IP Address Management, DNS
May 04, 2011  -  by BlueCat Networks

MarkMonitor to Co-Chair International Anti-Counterfeiting Coalition Spring Conference
May 03, 2011  -  by MarkMonitor

How a .COM Can Also be a .ORG: Open Compute Project
May 03, 2011  -  by PIR

CentralNic, .US.ORG Reserve Olympics Trademark to Protect Against Cybersquatters and Brand Abuse
Apr 29, 2011  -  by CentralNic

.CO Registry to Expand Exclusive List of Accredited Registrars
Apr 26, 2011  -  by .CO Internet


Advertise on CircleID

If your advertising and marketing objectives entail reaching high-ranking experts and professionals within the IT and Internet industry, CircleID can help you achieve it.
Find Out More...





If you no longer wish to receive these emails, please reply to this message with "Unsubscribe" in the subject line or simply click on the following link: Unsubscribe

CircleID
Suite 172, 100 - 1260 Hamilton Street
Vancouver, British Columbia V6B 2S8
CA

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts (Last 7 Days)