Monthly Archives: February 2016

IPv4 Market Outlook

This post was co-authored by Marc Lindsey, President and Janine Goodman, Vice President of Avenue4.

When 2015 began, there were several million IPv4 numbers still in the American Registry for Internet Numbers (ARIN) IPv4 free pool, ARIN was processin… Continue reading

Posted in circleid | Tagged , | Comments Off on IPv4 Market Outlook

Apple vs FBI: Apple and Others to Argue on the Hill

Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans’ Security and Privacy

In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. We obviously have no idea what kind of questions Mr. Sewell will be asked.

So what is Apple saying?

They’re sticking to their line, but it’s also clear that they’re very conscious that the world is watching. Here are a couple of extracts from their testimony (emphasis added):

The FBI has asked a Court to order us to give them something we don’t have. To create an operating system that does not exist — because it would be too dangerous. They are asking for a backdoor into the iPhone — specifically to build a software tool that can break the encryption system which protects personal information on every iPhone.

It’s not simply a matter of Apple getting the data off a phone, they’re being asked to write a special version of their operating system — a more insecure version — to facilitate this.

The FBI is asking Apple to weaken the security of our products. Hackers and cyber criminals could use this to wreak havoc on our privacy and personal safety. It would set a dangerous precedent for government intrusion on the privacy and safety of its citizens.

One of my favourite lines, however, is this one:

… there’s probably more information stored on that iPhone than a thief could steal by breaking into your house.

The importance of encryption, privacy and security are all topics that Apple touches on in their testimony.

Apple wants Congress to be the one to decide if the laws need to be changed, not a court somewhere making use of a 200 year old bit of legislation.

Here’s the full text of Apple’s testimony.

Written by Michele Neylon, MD of Blacknight Solutions

Follow CircleID on Twitter

More under: Law, Privacy, Security

Continue reading

Posted in circleid | Tagged , , | Comments Off on Apple vs FBI: Apple and Others to Argue on the Hill

Market Recap 2/29/16 Tucows up 1% – Verisign off 1.6%

Market Recap 2/29/16 Quiet day for the most part, Go Daddy (GDDY) and Tucows (TCX) extended their gains from last week. Verisign (VRSN) was down $1.39 or 1.62% on the day. Alphabet Inc GOOGL 717.22 -7.64 (-1.05%) Godaddy Inc GDDY 31.35 +0.13 (0.42%) Rightside Group Ltd NAME 8.54 +0.06 (0.71%) Minds + Machines Group… MMX […]

The post Market Recap 2/29/16 Tucows up 1% – Verisign off 1.6% appeared first on

Continue reading

Posted in thedomains | Tagged , | Comments Off on Market Recap 2/29/16 Tucows up 1% – Verisign off 1.6%

Which Comes First, the Trademark or Domain?

For years, the question of exactly when to register a domain name has been one asked by legal departments, as they’ve sought to formalize their internal processes.

If you were to think about it logically, it would make most sense to register it after the trademark had been cleared. After all, why bother to register a domain, if you aren’t going to use it to support a product, service or campaign?

However, there are some major differences between trademarks and domains, and the ways in which they should be treated. To start, the same mark can be legitimately owned by multiple owners across different classes. But when it comes to a domain, there can only be one owner. And unlike trademarks where there are opposition periods, once a domain is registered, it’s pretty much gone — unless you have a right to the name and its being used in bad faith, or you can purchase it from the owner.

I know that I’m about to state the obvious, but another major difference between registering a trademark and domain is that registering a domain is fast, easy and inexpensive and just about anyone can do it. Whereas registering a trademark can be an involved, expensive process.

So am I saying that you should always register the domain first? Not exactly.

What I do think is, for any new potential brand, a search across the top 25 TLDs should be conducted to check whether the domain is available, using a secure Whois lookup tool. At that time, also do a search for close matches or obvious misspellings — this will give you an early indicator of whether the brand could be problematic. Depending on the term being searched, all names may show as available, especially if the brand is a totally made-up word. You might think, well this brand is in the free and clear, so I’ll just register these 25 domain names? Sure this seems like a no-brainer, but this could end up being a costly mistake if a full trademark clearance search shows the brand to be problematic.

So what to do? In this scenario, I would recommend first registering the .com anonymously through a retail registrar. DO NOT register it anonymously through a corporate-only registrar — this will do you no good, as domain speculators closely watch the registrations of corporate-only registrars. Once the trademark clearance search is complete, proceed with the additional registrations, also using an anonymized service if there is a desire to keep the brand name under wraps.

What I just described is the ideal situation — but often you’ll find that the brand you want is already registered as a domain in .com and a smattering of other top TLDs. Now what? The next question to be answered is whether or not another brand might do, whether concatenating the brand with product type is an option, whether doing without the domain altogether is possible, and how much the company might be willing to spend to purchase domains from the existing owners. Knowing how the domains are currently being used will be necessary in determining whether acquiring the domains from the existing owner is really even an option.

Too often I’ve seen companies launch brands without have the domains in place, only to scramble at the last-minute to register them or purchase them from squatters who learned of the brands because some domains were not registered anonymously. I’ve also seen companies spend hundreds of thousands of dollars to acquire domains and still not attain the market presence that they were hoping to achieve.

At the end of the day, there is probably no one right way to secure domain names for new brands. That said, what is critical is that companies take domains into consideration early-on in the process, prior to clearing trademarks. Doing so will not only allow companies to make better decisions regarding the pursuit of new trademarks, but it will also help to set expectations with regards to costs and effort required to secure domains.

Written by Elisa Cooper, Vice President of Marketing at Lecorpio

Follow CircleID on Twitter

More under: Domain Names, Intellectual Property

Continue reading

Posted in circleid | Tagged , | Comments Off on Which Comes First, the Trademark or Domain?

Repeat DDoS Attacks the Norm in Q4 2015, 24 Attacks per Target on Average

During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4, reports Akamai in its newly released Q4 2015 State of the Internet – Security Report. Malicious actors aren’t backing down, says Stuart Scholly, VP and General Manager of Security Business Unit: “They’re hammering away at the same targets over and over again, looking for a moment when defenses may be down.” Study found more than half of the Q4 attacks (54%) targeted gaming companies, with another 23% targeting the software and technology industry.

DDoS Attack Frequency by Industry – The gaming and software industries were targeted 77% of the time in Q4 2015, up from 75% in Q3 2015 (Source: Akamai / Click to Enlarge)

The largest attack of Q4 peaked at 309 Gigabits per second (Gbps) and 202 Million packets per second (Mpps). This attack targeted a customer in the software and technology industry and used an unusual combination of SYN, UDP and NTP attacks originating from the XOR and BillGates botnets. The attack was part of a sustained campaign in which the victim was targeted 19 times over an eight-day period, with additional attacks following in early January.

10 Most Frequently Attack Vectors by Quarter – In Q4, TCP anomaly attacks moved in to the top 10 vectors, edging out ICMP attacks from the top 10 list (Source: Akamai / Click to Enlarge)

Copy of the Q4 2015 State of the Internet – Security Report can be downloaded from

Follow CircleID on Twitter

More under: Cyberattack, Cybercrime, DDoS, Security

Continue reading

Posted in circleid | Tagged , , , | Comments Off on Repeat DDoS Attacks the Norm in Q4 2015, 24 Attacks per Target on Average