Archive for the ‘Internet Security’ Category


“How to Avoid Go Daddy’s 60 Day Lock for Whois Change”

Posted May 13th, 2011

The following linked story  is an exciting piece of information for anyone who buys or sells domains.

The explanation and tips on navigating Go Daddy’s maddening 60 day lock for changes to the WHOIS  come courtesy of Domain Name News.

Click HERE to read.

Tags: ,
Posted in domaining, Internet Security, Uncategorized, Whois by  



Posted May 9th, 2011

Network Security has been a major talking point this year.  Verisign has kept that ball rolling, issuing a press release for two studies they have completed concerning DDOS attacks and  DNS failures.

According to  the Verisign press release: “A significant percentage of organizations are ill-equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to two new research studies commissioned by VeriSign, Inc., the trusted provider of Internet infrastructure services for the networked world.

As networking executives from around the world convene this week at Interop’s annual flagship event, Verisign is spotlighting research findings that underscore the urgent need for robust DDoS protection, reliable and secure DNS infrastructure, and advanced threat intelligence.”

Click HERE to read more.

Tags: , ,
Posted in Internet Security by  


IP Clearinghouse Teams Up With CoCCA to Provide Rights Protection for Eight ccTLDs

Posted March 4th, 2011

“CoCCA and IP Clearinghouse, the company that operates CHIP (ClearingHouse for Intellectual Property), have collaborated to allow trademark owners to retroactively (or proactively) associate trademark information with specific domain names in the following country-code extensions: .AF, .CX, .GS, HT,.KI, .NF, .SB and .TL .

CHIP is a new technology that is designed to allow trademark owners to efficiently and effectively safeguard and enforce their rights on the Internet, and in particular in the domain name space. More TLDs will follow after the completion of the initial trial.”

Click HERE and HERE to learn more.

Tags: , ,
Posted in CCTLD's, Intellectual Property, Internet Security by  


State Dept. Unveils Internet Freedom Agenda

Posted February 16th, 2011


In a speech in Washington, Secretary of State Hillary Clinton offered the administration’s most emphatic rebuke yet of regimes that censor Internet content and target dissident groups online.

As the revolutions in Egypt and Tunisia have inspired groundswells of government opposition in states around the Middle East, Secretary of State Hillary Clinton on Tuesday noted the powerful role that the Internet and Web-based communications technologies have played in those movements.

See the full story HERE.

Posted in Enforcement, Internet Security, Tech News by  


How a Remote Town in Romania Has Become Cybercrime Central

Posted February 15th, 2011

Three hours outside Bucharest, Romanian National Road 7 begins a gentle ascent into the foothills of the Transylvanian Alps. Meadowlands give way to crumbling houses with chickens in the front yard, laundry flapping on clotheslines. But you know you’ve arrived in the town of Râmnicu Vâlcea when you see the Mercedes-Benz dealership.”

Click HERE to read the rest of Wired Magazine’s fascinating story of Phishing, Scamming, Cybersquatting, hacking and malware attacks.

Tags: , ,
Posted in Enforcement, Internet Security, Tech News, True Domain Crime by  


Bill to Restrict Online Tracking Introduced in Congress

Posted February 12th, 2011

According to “ Rep. Jackie Speier (D-California) introduced a bill Friday that would require online-tracking firms to allow citizens to opt out of tracking, or else face stiff fines.”

Click HERE to read the full article.

Tags: , ,
Posted in Enforcement, Internet Security, World Events by  


NameSmash 2010 Year In Review

Posted January 6th, 2011

From the successful launch of IDNs to Google’s battle with China to the approval of .XXX, 2010 was a year marked by progress. We might not have flying cars, robot butlers or crops that thrive on Gatorade but we do have Twitter weddings.

Behold, the NameSmash 2010 year in review!


  • Cybersquatting fell to a three year low
  • Google threatened to leave China
  • Expressions of Interest for new gTLDs ( was a hot button topic


  • China tightens rules for domain owners
  • Afilias bought Dot Mobi
  • ICANN warns that the adoption of IPV6 is essential
  • The .CO launch is announced


Tags: , , , , , , ,
Posted in EOI, Events, gTLDS, ICANN, IDNs, Internet Security, IPv6, Know Your Domains, Registrars, Registries, Tech News, trademark issues by Gets Caught In WikiLeaks Fray

Posted December 13th, 2010

In what could easily be classified as the worst day of work ever for Mark Jeftovic and his Ottowa, Canada based company the news that he had become involved in the unfolding Wikileaks drama came in an e-mail on December 3. According to the New York Times, “Several blogs and Web sites had posted variations of this sentence: “ has cut off DNS service to WikiLeaks.” denied cutting off service to Wikileaks because had never provided them in the first place. It was instead the company EveryDNS.

Luckily did not become a target of Wikileaks supporters who swarmed other sites who dropped affiliations with the group following the International condemnation of the release of previously classified information by it’s founder Julian Assange. However, did have several PR fires to put out as the New York Times, The Financial Times, and The Guardian all printed the name of his company as the next target for Wikileaks sympathizers.

And then, things got weirder when Wikileaks themselves came knocking…

To read the full article, click HERE

Tags: , , ,
Posted in Internet Security, Tech News, World Events by  


ICANN Addresses Internet Security and Stability Concerns

Posted November 15th, 2010

To read ICANN’s statements regarding concerns over Internet security, click HERE.

Tags: ,
Posted in ICANN, Internet Security by  


The Pentagon Strikes First

Posted August 31st, 2010

From the Washington Post

Pentagon Considers Preemptive Strikes as Part of Cyber-Defense Strategy

The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary’s computer network overseas – but it is still wrestling with how to pursue the strategy legally.

The department is developing a range of weapons capabilities, including tools that would allow “attack and exploitation of adversary information systems” and that can “deceive, deny, disrupt, degrade and destroy” information and information systems, according to Defense Department budget documents.

See the full story HERE.

Tags: , ,
Posted in Enforcement, Internet Security by