Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Forbes.com Chooses NeuStar’s Ultra Internal DNS Service

Forbes.com, a division of Forbes, Inc. has selected its Ultra™ Internal Domain Name Systems (DNS) service, with an integrated Dynamic Host Configuration Protocol (DHCP), to improve the functionality, security and manageability of the Forbes.com internal network. more

Blurring the Lines between APTs and Cybercrime: Cobalt Mirage Uses Ransomware to Target U.S. Organizations

In the past, security experts typically made a distinction between a cybercrime and an advanced persistent threat (APT). While cybercrime focused on obtaining financial gain, APTs trailed their sights on specific organizations, often to steal nation-state secrets. more

The Business of Cybercrime: Does Malicious Campaign Planning Take as Long as Legitimate Marketing Campaign Planning?

It has become customary for cybercriminals to ride on famous brands to make their nefarious campaigns work. The release of the world's most-awaited tech gadgets is no different. And given the public attention and techies' innate desire to be first to own the latest gadgets, threat actors will always zoom in on prospective buyers via the most ingenious scams. more

The Need for Email Address Verification in Light of Subpoena-Themed Phishing Attacks

At the most basic level, the Internet consists of interconnected networks that communicate using standard protocols such as the Border Gateway Protocol (BGP) and the Domain Name System (DNS). As such, it is built on trust or an honor system – trust that routing requests received from another network are valid, and the traffic sent in response to requests is legitimate. more

Internet Adds More Than Five Million Domain Names in Second Quarter

The increase of 5.2 million domain names marks a growth rate of 2.5 percent over the first quarter. Registrations have grown by more than 16.9 million, or 8.6 percent, since the second quarter of 2010. more

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments. more

Who Could Be Behind the Latest GitHub-Hosted Malware Infrastructure?

GitHub is a popular code repository used by almost all software developers. Anyone can access it to share their code with practically anyone interested. Unfortunately, not every GitHub user is trustworthy. It has, in fact, been used to host malware at least a couple of times. more

Neustar Launches SiteProtect for DDoS Protection

Neustar, Inc. today announced the launch of SiteProtect, a cloud-based service for UltraDNS customers that brings a new level of security to online properties against Distributed Denial of Service (DDoS) attacks. more

Common Threats That Can Be Overcome by Email Verification

One of the most effective and prevalent ways to reach someone in today's business world remains email. With billions of users worldwide, it is the backbone of business communications. more

Committed to Keeping the Internet a Safe Place

.ORG, The Public Interest Registry (PIR) is committed to providing a model for exemplary Registry practices. In furtherance of this goal, PIR has been working proactively to address domain name abuses including phishing, malware, child pornography, and spam distribution. more

Procuring Digital Evidence for Reverse Domain Hijacking Case with Domain Research & Monitoring Tools

Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more

APT29 Goes from Targeted Attacks to Phishing via NOBELIUM: A DNS Deep Dive

APT29, believed to be an espionage group from Russia, became known for launching targeted attacks against organizations in Ukraine. But over the course of investigating the threat group, Mandiant discovered that it may have a hand in cybercriminal operations, specifically phishing, as well. more

MediaZone Selects NeuStar for Superior DNS Service

MediaZone, leading global online broadcaster specializing in sports, entertainment, and international programming, selects NeuStar's Ultra Services Domain Name Systems. more

Neustar Implements DNS Security Extensions in the .US Registry

Neustar, Inc. announced today that it has implemented Domain Name Security Extensions (DNSSEC) in the .US country-code top level domain registry. The technology uses public key cryptography and digital signatures to protect the Domain Name System (DNS) from attacks that hijack and redirect domain name requests. more

U.K. Law Firm Selects NeuStar’s Managed Internal DNS Service

TWM Solicitors LLP, a law firm with offices throughout the southeast of England, has selected NeuStar's Managed Internal Domain Name Systems (DNS) service with integrated Dynamic Host Configuration Protocol (DHCP) to improve the performance, reliability and manageability of its internal network. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest