Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

DHL Was the Most-Phished Company in 2021, Will That Be True in 2022, Too?

Checkpoint researchers identified DHL as the most-imitated brand in phishing campaigns at the end of 2021. We sought to find if that will remain the case this year by looking at various intelligence sources. more

Detecting Possible Domain Generation Algorithm-Related Threats Using Typosquatting Data Feed

Domain generation algorithm (DGA) is used to generate several domain names commonly used for command-and-control (C&C) servers in malware attacks. The logic behind a domain name generation algorithm is quite simple. Instead of hard-coding the domain or IP address into the malware, the malware finds its C&C under a domain with a seemingly random name. more

Verisign Announces Increase in .COM/.NET Domain Name Fees

VeriSign, Inc., the trusted provider of Internet infrastructure services for the networked world, today announced, effective Jan. 15, 2012, an increase in registry domain name fees for .com and .net, per its agreements with the Internet Corporation for Assigned Names and Numbers (ICANN). more

IP Geolocation Intelligence: An Aid Against Location-Based Threats?

Cybercrime is borderless. Just like marketing teams use location-based targeting to create a deeper connection with customers through content personalization, cybercriminals adjust their attacks to exploit their victims' fears. more

RIGHT OF THE DOT and Verisign Enter into Marketing and Referral Arrangement for new gTLD Application

Under the arrangement, Verisign will refer gTLD applicants seeking premium domain consulting services to RIGHT OF THE DOT, and RIGHT OF THE DOT will refer clients requiring registration and resolution services for new gTLDs to Verisign. more

Neustar Launches Brand Assurance Program - Making it Easier for Enterprises to Secure Their Own gTLD

Neustar's Brand Assurance Program is an entry level program that helps companies, organizations and enterprises simply and affordably meet ICANN's registration requirements. It includes an easy migration path to additional services brands will need when they decide to fully deploy their generic top level domains (gTLDs).
 more

.PW Registry Extends Landrush Till March 22, 2013

The Registry for .PW – the Professional Web, today announced that the Landrush Period will be extended for 4 days, until March 22, 2013. more

ZeuS, Still Alive and Kicking in the Form of Jabber ZeuS?

ZeuS malware traces its origin as far back as 2006, when it was used to steal victims' online banking credentials. In 2011, its source code was leaked on a file-sharing site and quickly spread throughout various underground fora. more

Cybersecurity on the Clock: How to Run More Timely and Efficient Operations

A career as an information security analyst is one of the top technology jobs nowadays and for a good reason. Billions of dollars are spent every year to fight cybercrime, and companies are now willing to pay top rates for the best talent available. more

IPv6 Usage in the U.S. Surpasses 50%, but Lags Behind Global Leaders

The transition to IPv6 has reached a significant milestone in the United States. As of February 9, 2025, more than half of all traffic to Google's services from U.S. users is now conducted over IPv6. This marks a step forward for a country with deep historical ties to the Internet but one that still lags behind several others in adoption rates. more

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

With significant data breaches making headlines over the last six months, most notably the U.S. Government's Office of Personnel Management (OPM), organizations managing critical networks and data are watching their worst nightmares play out on a public stage. more

Shining the WHOIS and DNS Spotlight on International Fraud

Scammers and fraudsters have been making life hard for users the world over for a long time now. To help expose potential malicious campaigns, threat researchers like Dancho Danchev have been collating indicators of compromise (IoCs) that can be used in further investigations. more

Rogue Tor Browser: When Search for Anonymity Leads to Exposure Instead

Anyone who wishes to browse the Internet without the prospect of being spied upon by others, whether for legal or illegal purposes, can always rely on using the Tor browser if they're so inclined.  more

Typosquatting Domains Every AppleID Owner Should Avoid

On 29 April 2020, IBM X-Force warned users of an AppleID typosquatting campaign specifically targeting members of the media sector. We sought to dig deeper into these threats and find other relevant domains and IP addresses that users, regardless of industry, may need to steer clear of. more

Neustar to Establish its Own Brand-Specific Generic Top-Level Domain

Following today's approval of the new generic top level domain (gTLD) guidebook by ICANN, Neustar, a leader in Internet and telecommunications information and analysis, will be joining the ranks of Canon®, Hitachi® and other global brands in applying for a new gTLD. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest