The increase of 7.3 million domain names globally equates to a growth rate of 3.1 percent over the first quarter of 2012, and marks the sixth straight quarter with greater than two percent growth. more
Twitter was recently abuzz with news regarding an ongoing Cardano scam via a downloadable phishing app. Posing as a giveaway promo, which is how cybercriminals have frequently been victimzing cryptocurrency owners these days, users who get tricked into downloading the rogue app end up with stolen credentials instead. more
It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target - including DNS providers like us. Neustar provides UltraDNS and recently dealt with an attack on our network that was massive by industry standards, impacting our customers and even our upstream providers. more
Do you know where your online customers are? Can you tell whether the right users in your network are all authorized to access its content? Are you able to detect and block suspicious traffic and devices? more
As IPv4 nears depletion, the world is turning to IPv6 to meet the insatiable demand for IP addresses. The sooner you enable IPv6, the better. An 11th hour fire drill is the last thing you want as you convert to a dual-stack address base accommodating both protocols. more
Co-founder of OnePlus, Carl Pei -- who recently revealed the highly-anticipated OnePlus 2 smartphone in the world's first virtual reality product launch -- is amongst the first tech industry leaders to reserve a .tech domain name. Carl intends to use 'carl.tech' for his blog and plans to make the move by the end of this year. more
It is imperative that U.S. businesses with international and European clients understand how the GDPR may affect their businesses and begin to implement strategies to ensure compliance with the regulation. more
Phishing, despite its age and infamy, remains one of the top threats to corporate and personal networks alike. And it's not hard to see why -- it continues to be effective. In fact, more than a third of all data breaches today involve phishing. more
Microsoft is among the top technology companies globally and so is in critical need of brand protection. The company name already figured in many phishing campaigns, including Microsoft Office 365 that has been abused several times in business email compromise (BEC) scams. more
Distinguishing properties added by the companies themselves is an essential part of this study. If the legitimate company owns the domains and subdomains, they have control over these assets. Otherwise, the digital properties can be considered rogue that can be potentially used in brand abuse, phishing campaigns, and other malicious activities. more
Melissa, what many consider to be the first malspam campaign, emerged in 1999. Once successfully installed, the "mass-mailing" virus forwarded copies of itself to the first 50 email addresses on a victim's contact list. While the malware wasn't as dangerous as current variants, it could still effectively max out network resources, resulting in downtime. more
New research from registry services provider Afilias reveals that the launch of branded generic Top Level Domains (gTLDs) will likely mark the start of a decline in the number of brands using social networks. more
VeriSign, Inc. today unveiled the Verisign Uptime Bundle, a new service bundle that combines protection from Distributed Denial of Service (DDoS) attacks with Verisign's unparalleled Domain Name System (DNS) hosting, and threat intelligence services -- all in one competitively priced solution. more
Phishing keeps making much noise in the realm of cybersecurity, and not in a good way. A majority of cyber attacks start with a phishing email, making the tactic responsible, at least partially, for close to 90% of data breaches. more
Like it or not but the face of cybersecurity has changed over the past few years and while conventional approach has taken a back seat lately, non-traditional methods are coming to the rescue. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global