Archive for the ‘Internet Security’ Category
Posted May 13th, 2011
The following linked story is an exciting piece of information for anyone who buys or sells domains.
The explanation and tips on navigating Go Daddy’s maddening 60 day lock for changes to the WHOIS come courtesy of Domain Name News.
Click HERE to read.
Tags: Go Daddy, Whois
Posted in domaining, Internet Security, Uncategorized, Whois by Kelly Hardy
Posted May 9th, 2011
Network Security has been a major talking point this year. Verisign has kept that ball rolling, issuing a press release for two studies they have completed concerning DDOS attacks and DNS failures.
According to the Verisign press release: “A significant percentage of organizations are ill-equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to two new research studies commissioned by VeriSign, Inc., the trusted provider of Internet infrastructure services for the networked world.
As networking executives from around the world convene this week at Interop’s annual flagship event, Verisign is spotlighting research findings that underscore the urgent need for robust DDoS protection, reliable and secure DNS infrastructure, and advanced threat intelligence.”
Click HERE to read more.
Tags: DDOS attacks, DNS failures, Verisign
Posted in Internet Security by Kelly Hardy
Posted March 4th, 2011
“CoCCA and IP Clearinghouse, the company that operates CHIP (ClearingHouse for Intellectual Property), have collaborated to allow trademark owners to retroactively (or proactively) associate trademark information with specific domain names in the following country-code extensions: .AF, .CX, .GS, HT,.KI, .NF, .SB and .TL .
CHIP is a new technology that is designed to allow trademark owners to efficiently and effectively safeguard and enforce their rights on the Internet, and in particular in the domain name space. More TLDs will follow after the completion of the initial trial.”
Click HERE and HERE to learn more.
Tags: CHIP, CoCCA, IP Clearinghouse
Posted in CCTLD's, Intellectual Property, Internet Security by Kelly Hardy
Posted February 16th, 2011
In a speech in Washington, Secretary of State Hillary Clinton offered the administration’s most emphatic rebuke yet of regimes that censor Internet content and target dissident groups online.
As the revolutions in Egypt and Tunisia have inspired groundswells of government opposition in states around the Middle East, Secretary of State Hillary Clinton on Tuesday noted the powerful role that the Internet and Web-based communications technologies have played in those movements.
See the full story HERE.
Posted in Enforcement, Internet Security, Tech News by Ken Taylor
Posted February 15th, 2011
“Three hours outside Bucharest, Romanian National Road 7 begins a gentle ascent into the foothills of the Transylvanian Alps. Meadowlands give way to crumbling houses with chickens in the front yard, laundry flapping on clotheslines. But you know you’ve arrived in the town of Râmnicu Vâlcea when you see the Mercedes-Benz dealership.”
Click HERE to read the rest of Wired Magazine’s fascinating story of Phishing, Scamming, Cybersquatting, hacking and malware attacks.
Tags: cybercrime, Romania, Wired Magazine
Posted in Enforcement, Internet Security, Tech News, True Domain Crime by Kelly Hardy
Posted February 12th, 2011
According to Wired.com “ Rep. Jackie Speier (D-California) introduced a bill Friday that would require online-tracking firms to allow citizens to opt out of tracking, or else face stiff fines.”
Click HERE to read the full article.
Tags: Online Tracking, Rep. Jackie Speier, Wired
Posted in Enforcement, Internet Security, World Events by Kelly Hardy
Posted January 6th, 2011
From the successful launch of IDNs to Google’s battle with China to the approval of .XXX, 2010 was a year marked by progress. We might not have flying cars, robot butlers or crops that thrive on Gatorade but we do have Twitter weddings.
Behold, the NameSmash 2010 year in review!
- Cybersquatting fell to a three year low
- Google threatened to leave China
- Expressions of Interest for new gTLDs (http://www.namesmash.com/?p=452#more-452) was a hot button topic
- China tightens rules for domain owners
- Afilias bought Dot Mobi
- ICANN warns that the adoption of IPV6 is essential
- The .CO launch is announced
Tags: .xxx, 2010 year in review, gTLDS, ICANN, IDNs, IPv6, Tiffany vs. EBay, Vertical Integration
Posted in EOI, Events, gTLDS, ICANN, IDNs, Internet Security, IPv6, Know Your Domains, Registrars, Registries, Tech News, trademark issues by Kelly Hardy
Posted December 13th, 2010
In what could easily be classified as the worst day of work ever for Mark Jeftovic and his Ottowa, Canada based company EasyDNS.net the news that he had become involved in the unfolding Wikileaks drama came in an e-mail on December 3. According to the New York Times, “Several blogs and Web sites had posted variations of this sentence: “EasyDNS.net has cut off DNS service to WikiLeaks.”
EasyDNS.net denied cutting off service to Wikileaks because EasyDNS.net had never provided them in the first place. It was instead the company EveryDNS.
Luckily EasyDNS.net did not become a target of Wikileaks supporters who swarmed other sites who dropped affiliations with the group following the International condemnation of the release of previously classified information by it’s founder Julian Assange. However, EasyDNS.net did have several PR fires to put out as the New York Times, The Financial Times, and The Guardian all printed the name of his company as the next target for Wikileaks sympathizers.
And then, things got weirder when Wikileaks themselves came knocking…
To read the full article, click HERE
Tags: EasyDns.net, EveryDns, Julian Assange, Wikileaks
Posted in Internet Security, Tech News, World Events by Kelly Hardy
Posted November 15th, 2010
To read ICANN’s statements regarding concerns over Internet security, click HERE.
Tags: ICANN, Internet stability
Posted in ICANN, Internet Security by Kelly Hardy
Posted August 31st, 2010
From the Washington Post
Pentagon Considers Preemptive Strikes as Part of Cyber-Defense Strategy
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary’s computer network overseas – but it is still wrestling with how to pursue the strategy legally.
The department is developing a range of weapons capabilities, including tools that would allow “attack and exploitation of adversary information systems” and that can “deceive, deny, disrupt, degrade and destroy” information and information systems, according to Defense Department budget documents.
See the full story HERE.
Tags: cyber-security, Pentagon, Washington Post
Posted in Enforcement, Internet Security by Ken Taylor