Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Can IP Geolocation Contribute to Detecting Online Credit Card Fraud?

The problem of credit card fraud is not set to be resolved anytime soon. On the one hand, detecting and preventing the artifice is one of the most challenging aspects of e-commerce. more

Resignation of Public Interest Registry President and CEO Announcement

Viltz has been the organization's president and CEO since February 2003. Effective 1 January 2007, Eva Frölich, chair of the PIR board of directors, will serve as acting CEO until a replacement is named. more

A Re-Examination of the Defense of Laches After 18 Years of the UDRP

After 18 years of the UDRP, it is time to re-examine the defense of laches. When the UDRP was launched in 1999, the defense of "laches" was likely not foremost on anyone's mind. After all, "laches" refers to a lack of diligence in making a legal claim - and since the UDRP was brand new and the commercial use of domain names was in its relative infancy in 1999, nobody was really concerned with a trademark owner having "unreasonably delayed" making a UDRP complaint. more

The Orvis.com Data Leak: A Short Investigation Using WHOIS Information

On November 11, news about the massive data exposure of the clients of Orvis, a 163-year-old retailer, made headlines. Some of the company's login credentials were posted online... With over 80 retail stores, 10 outlets, and hundreds of independent dealers worldwide, we believe potential attackers could get their hands on millions of customer data. more

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons. more

5 Reasons Why Businesses Must Do Email Verification

Everything important in business needs to be adequately maintained for effective long-term operations. This includes relationships with customers, employees, and partners as well as IT systems and equipment. more

An Analysis of the Gaming Industry’s Domain Attack Surface

The videogame industry has outperformed the movie and North American sports industry in 2020, and market experts expect the trend to continue on in 2021. So reports about the increasing cyber attacks targeting the said industry is not surprising as threat actors tend to go after lucrative targets. more

NeuStar Buys Webmetrics

NeuStar Inc., which provides clearinghouse services to the Internet and communications industries, has acquired San Diego company Webmetrics Inc., which monitors and measures Web and network performance. more

ICANN 45: New gTLDs Not Far Away Now

Just a few days have passed since the most recent ICANN meeting in Toronto ended and, like always, it was a whirlwind of activity and information. But this time around, with a new CEO and accompanying organizational changes, it felt like the winds were all moving in the same direction. more

Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags

The holidays are a bustling time for businesses and, unfortunately, fraudsters too. Travel fraud is rife in the lead up to the festivities, with airline ticket scams taking center stage. According to a report by The Street, airlines lose US$2.4–4.8 billion yearly due to false bookings. Consumers, meanwhile, lose US$283–588 per transaction. more

Verisign’s Q2’15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Verisign just released its Q2 2015 DDoS Trends Report, which provides a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

IP spoofing is a cyberattack technique that entails using a device or a network to fool users into thinking the attacker is part of a legitimate entity. Often, cybercriminals use this method to access computers in a target network to obtain sensitive information, turn systems into zombies, or launch a denial-of-service (DoS) attack. more

Neustar Names Joe Pasqua to Head Neustar Labs

Neustar Inc. today announced the appointment of Joe Pasqua as Vice President of Neustar Labs, a newly created position. Mr. Pasqua was previously chief technology officer of Symantec's $2B Data Center business, and later led that company's global research, producing technologies for a diverse set of security and storage products. more

Verisign and Coalition for ICANN Transparency, Inc. (“CFIT”) Resolve Litigation

Verisign, Inc., the trusted provider of Internet infrastructure services for the networked world, announced today that it has entered into a Settlement Agreement and Mutual Release with the Coalition for ICANN Transparency, Inc. ("CFIT"), CFIT's members, and specified related parties that resolves the over five-year long CFIT litigation. more

NeuStar Extends UltraDNS Network Infrastructure to Australia and China

NeuStar has announced that it has deployed network nodes in Sydney, Australia and Beijing, People's Republic of China, further expanding NeuStar's global constellation of DNS servers and enhancing the delivery of NeuStar UltraDNS services to the Asia-Pacific region. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest