Archive for the ‘Internet Security’ Category
Posted May 9th, 2011
Network Security has been a major talking point this year. Verisign has kept that ball rolling, issuing a press release for two studies they have completed concerning DDOS attacks and DNS failures.
According to the Verisign press release: “A significant percentage of organizations are ill-equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to two new research studies commissioned by VeriSign, Inc., the trusted provider of Internet infrastructure services for the networked world.
As networking executives from around the world convene this week at Interop’s annual flagship event, Verisign is spotlighting research findings that underscore the urgent need for robust DDoS protection, reliable and secure DNS infrastructure, and advanced threat intelligence.”
Click HERE to read more.
Tags: DDOS attacks, DNS failures, Verisign
Posted in Internet Security by Kelly Hardy
Posted March 4th, 2011
“CoCCA and IP Clearinghouse, the company that operates CHIP (ClearingHouse for Intellectual Property), have collaborated to allow trademark owners to retroactively (or proactively) associate trademark information with specific domain names in the following country-code extensions: .AF, .CX, .GS, HT,.KI, .NF, .SB and .TL .
CHIP is a new technology that is designed to allow trademark owners to efficiently and effectively safeguard and enforce their rights on the Internet, and in particular in the domain name space. More TLDs will follow after the completion of the initial trial.”
Click HERE and HERE to learn more.
Tags: CHIP, CoCCA, IP Clearinghouse
Posted in CCTLD's, Intellectual Property, Internet Security by Kelly Hardy
Posted February 16th, 2011
In a speech in Washington, Secretary of State Hillary Clinton offered the administration’s most emphatic rebuke yet of regimes that censor Internet content and target dissident groups online.
As the revolutions in Egypt and Tunisia have inspired groundswells of government opposition in states around the Middle East, Secretary of State Hillary Clinton on Tuesday noted the powerful role that the Internet and Web-based communications technologies have played in those movements.
See the full story HERE.
Posted in Enforcement, Internet Security, Tech News by Ken Taylor
Posted February 15th, 2011
“Three hours outside Bucharest, Romanian National Road 7 begins a gentle ascent into the foothills of the Transylvanian Alps. Meadowlands give way to crumbling houses with chickens in the front yard, laundry flapping on clotheslines. But you know you’ve arrived in the town of Râmnicu Vâlcea when you see the Mercedes-Benz dealership.”
Click HERE to read the rest of Wired Magazine’s fascinating story of Phishing, Scamming, Cybersquatting, hacking and malware attacks.
Tags: cybercrime, Romania, Wired Magazine
Posted in Enforcement, Internet Security, Tech News, True Domain Crime by Kelly Hardy
Posted February 12th, 2011
According to Wired.com “ Rep. Jackie Speier (D-California) introduced a bill Friday that would require online-tracking firms to allow citizens to opt out of tracking, or else face stiff fines.”
Click HERE to read the full article.
Tags: Online Tracking, Rep. Jackie Speier, Wired
Posted in Enforcement, Internet Security, World Events by Kelly Hardy
Posted January 6th, 2011
From the successful launch of IDNs to Google’s battle with China to the approval of .XXX, 2010 was a year marked by progress. We might not have flying cars, robot butlers or crops that thrive on Gatorade but we do have Twitter weddings.
Behold, the NameSmash 2010 year in review!
- Cybersquatting fell to a three year low
- Google threatened to leave China
- Expressions of Interest for new gTLDs (http://www.namesmash.com/?p=452#more-452) was a hot button topic
- China tightens rules for domain owners
- Afilias bought Dot Mobi
- ICANN warns that the adoption of IPV6 is essential
- The .CO launch is announced
Tags: .xxx, 2010 year in review, gTLDS, ICANN, IDNs, IPv6, Tiffany vs. EBay, Vertical Integration
Posted in EOI, Events, gTLDS, ICANN, IDNs, Internet Security, IPv6, Know Your Domains, Registrars, Registries, Tech News, trademark issues by Kelly Hardy
Posted December 13th, 2010
In what could easily be classified as the worst day of work ever for Mark Jeftovic and his Ottowa, Canada based company EasyDNS.net the news that he had become involved in the unfolding Wikileaks drama came in an e-mail on December 3. According to the New York Times, “Several blogs and Web sites had posted variations of this sentence: “EasyDNS.net has cut off DNS service to WikiLeaks.”
EasyDNS.net denied cutting off service to Wikileaks because EasyDNS.net had never provided them in the first place. It was instead the company EveryDNS.
Luckily EasyDNS.net did not become a target of Wikileaks supporters who swarmed other sites who dropped affiliations with the group following the International condemnation of the release of previously classified information by it’s founder Julian Assange. However, EasyDNS.net did have several PR fires to put out as the New York Times, The Financial Times, and The Guardian all printed the name of his company as the next target for Wikileaks sympathizers.
And then, things got weirder when Wikileaks themselves came knocking…
To read the full article, click HERE
Tags: EasyDns.net, EveryDns, Julian Assange, Wikileaks
Posted in Internet Security, Tech News, World Events by Kelly Hardy
Posted November 15th, 2010
To read ICANN’s statements regarding concerns over Internet security, click HERE.
Tags: ICANN, Internet stability
Posted in ICANN, Internet Security by Kelly Hardy
Posted August 31st, 2010
From the Washington Post
Pentagon Considers Preemptive Strikes as Part of Cyber-Defense Strategy
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary’s computer network overseas – but it is still wrestling with how to pursue the strategy legally.
The department is developing a range of weapons capabilities, including tools that would allow “attack and exploitation of adversary information systems” and that can “deceive, deny, disrupt, degrade and destroy” information and information systems, according to Defense Department budget documents.
See the full story HERE.
Tags: cyber-security, Pentagon, Washington Post
Posted in Enforcement, Internet Security by Ken Taylor
Posted June 21st, 2010
From ICANN News Alerts
On June 16, in the small town of Culpeper, Virginia, ICANN technical staff played host to an unusual and somewhat arcane event. Volunteers from over ten countries made their way by plane, train and automobile to witness and participate in the generation of the cryptographic key that will be used to secure the root zone of the Domain Name System using DNSSEC for the first time.
During the ceremony, participants were present within a secure facility and witnessed the preparations required to ensure that the so-called key-signing-key (KSK) was not only generated correctly, but that almost every aspect of the equipment, software and procedures associated with its generation were also verified to be correct and trustworthy. The ceremony was conducted with the goal of ensuring that there is widespread confidence throughout the technical Internet community that the root zone, once signed, can be relied upon to protect users from false information.
Ceremony participants referred to an extremely detailed checklist and were able to confirm that every aspect of the process was executed exactly as planned. The entire event was video-recorded simultaneously by three separate cameras, and ICANN arranged for the whole system to be subject to a SysTrust audit, a process supported by the archived, unedited video footage and the legal attestations of key participants.
The path down the long road to Culpeper has required considerable effort and investment by ICANN, and has benefited from an extremely productive collaboration between staff at ICANN, VeriSign and the US Department of Commerce. ICANN, with the help of some talented consultants, has designed processes that are thought to surpass those of many commercial Certificate Authorities not only in the degree of openness and transparency in their design and execution, but also in terms of the security engineering involved.
The design of the overall system requires ICANN to execute a ceremony like this one four times per year. The next ceremony is scheduled to take place on July 12 in El Segundo, California, where ICANN has built a second facility intended to ensure continuity for the DNS (and hence Internet users world-wide) in the event of a serious disaster in one location.
All design documentation for the ceremony will be published by ICANN, not only to promote transparency in the process for the root zone, but also to act as a valuable reference to any other organization that needs to build similar systems to support DNSSEC in top-level domains, enterprises, or anywhere else. The deployment of DNSSEC in the root zone of the DNS will hence not only act as a catalyst for global DNSSEC deployment because of the special nature of the root zone, but also because of the design and engineering investment ICANN is giving back to the wider community.
Tags: DNSSEC, ICANN, KSK
Posted in ICANN, Internet Security by Ken Taylor