UltraDNS today announced the extension of its global infrastructure with a node deployment in India, significantly enhances the online experience for more than 39 million Internet users in India. more
Viltz has been the organization's president and CEO since February 2003. Effective 1 January 2007, Eva Frölich, chair of the PIR board of directors, will serve as acting CEO until a replacement is named. more
On 9 March 2022, the Cybersecurity and Infrastructure Security Agency (CISA) added 98 indicators of compromise (IoCs) to their Conti ransomware alert page. WhoisXML API researchers examined these flagged domain names for recurring characteristics to uncover more artifacts. more
Agent Tesla, an infamous data stealer, has been plaguing Internet users since 2014. Much has been revealed about the malware, but the world didn't come to know about one of its more adept campaign perpetrators -- Hagga -- until last year. more
The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small. more
Sinkholing has long been employed as an effective cybersecurity solution to curb the spread of dangerous malware. Remember the infamous WannaCry ransomware outbreak in 2019? Security teams put a stop to the threat through sinkholing. more
Locky has been around since 2016, contributing to the total amount lost to ransomware worldwide, which has to this day reached US$20 billion in the U.S. alone. It usually gets delivered to users’ computers via emails with malicious attachments in the form of macro-laden Word documents. more
The Anti-Phishing Working Group (APWG) has released its Global Phishing trends study for the first half of 2009 and .ORG, The Public Interest Registry (PIR), was highlighted for its leadership in significantly reducing online fraud. more
NeuStar Partners With MegaFon to Deliver Russia's Third Mobile Instant Messaging ServiceNeuStar today announced that MegaFon, Russia's first all-Russian mobile operator in GSM 900/1800 standard, has selected NeuStar to launch its new Instant Messaging (IM) service. more
Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own to implicate a victim or move a case forward. more
The November 2021 PhishLabs Quarterly Threat Trends & Intelligence Report indicated the finance, social media, and telecommunications industries as phishers’ most targeted sectors. Last month, we analyzed a squatting campaign targeting U.S. Bancorp to determine if other banks were at risk, this time we’ll look into the top 3 phishing industry target – telecommunications. more
Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons. more
Threat actors reportedly attacked 29 government agencies worldwide in a recent malicious campaign. The attacks were attributed to China-based advanced persistent threat (APT) group Nickel, which has been known to trail its sights on governments and nongovernmental organizations (NGOs) across Europe, the Americas, and the Caribbean. more
Just a few days have passed since the most recent ICANN meeting in Toronto ended and, like always, it was a whirlwind of activity and information. But this time around, with a new CEO and accompanying organizational changes, it felt like the winds were all moving in the same direction. more
In the recent ado.com UDRP decision, the panel made the speculative and factually incorrect finding that a "high" asking price indicated bad faith targeting of a trademark. The UDRP is intended to address clear-cut cases of cybersquatting, not to second guess the asking prices set on inherently valuable domains in an open and competitive marketplace. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign