All entrepreneurs typically have a single goal in mind - ensuring their company's success -- and that means reaching and getting as many customers as possible. Nowadays, that translates to taking advantage of the data that GPS-enabled devices provides. more
Internet users are being tricked into installing browser extensions that can hijack their web searches. The end goal could be to insert affiliate links, but who knows what other malicious activities the threat actors behind them are capable of? more
The Domain Name System (DNS) plays an essential role in resolving IP addresses and hostnames. For organizations, it ensures that users reach the proper sites, servers, and applications. While it's a fundamental base for a functioning Web, the problem is that this system can easily be abused. more
The U.S. Independence Day comes with both fireworks and the best deals. On this holiday, retailers usually offer big discounts. At this time when people may opt to shop online, several publications like TechRadar and Business Insider even curated a list of 4th of July deals from different retailers. more
Neustar today announced that it has been selected as the registry services provider for 358 applications for new generic Top-Level domains (gTLDs). Additionally, Neustar has been selected by the City of New York as the registry service provider to manage the application process and operate .nyc. more
The beginning of the month of June, according to CleanINTERNET, marked the emergence of several zero-day attacks targeting vulnerable MOVEit servers to exfiltrate confidential data. MOVEit Transfer is a managed file transfer software that supports file and data exchange. more
At the 39th International ICANN Meeting, Afilias announced that it has been selected by dotHOTEL® as the registry services and DNS provider for its application to ICANN for the .hotel new top-level domain. dotHOTEL is supported by the International Hotel and Restaurant Association, the world's largest association of hospitality providers. more
Threat actors have been targeting Zoom and its users since the platform's launch, and it's easy to see why -- the latest stats show it accounts for 3.3 trillion annual meeting minutes worldwide. It's not surprising, therefore, that cyber attackers trailed their sights yet again on the communication app. more
In a Uniform Domain-Name Dispute-Resolution Policy (UDRP) case, the complainant usually has to prove three elements to win. Failing to satisfy these evidentiary requirements can render the case not only null and void, but the panel may also consider it as a reverse domain name hijacking (RDNH) instance. more
In a joint document, Afilias, NeuStar, and PIR discuss the salient issues facing the ICANN Board regarding a proposal for registry/registrar vertical integration in the newTLD round. The paper identifies some of the risks associated with the ICANN Staff proposal while at the same time proposing a path forward that does not jeopardize any further delay in the new generic Top-Level Domain (gTLD) launch process. more
Afilias Limited, a global provider of Internet domain name registry and Managed DNS services, today announced that it has entered into a formal agreement with Chinese Internet services leader HiChina, a subsidiary of Alibaba.com, to help Chinese brands take advantage of ICANN's forthcoming New TLD Program. more
As long as cybercriminals remain in business, so will the number of underground marketplaces grow. And despite the crackdown on the biggest markets like Silk Road, cybercriminals will continue to strive to put up their own marketplaces, probably given their profitability. Case in point? more
RegistryPRO, the ICANN-designated operator of the .PRO top-level domain and a subsidiary of leading registry services provider Afilias, today announced that DomainsBot will now include .PRO in their domain name search and suggestion tool, used by the majority of the world's best-known Internet domain name retailers, including 101Domains, Blacknight, MeshDigital, Net4In and Tucows. more
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), collectively called "intrusion detection and prevention systems (IDPSs)," monitor network traffic to stave off unauthorized access. Roughly speaking, an IDS detects possible malicious network activities, while an IPS stops malicious traffic from entering and possibly damaging a network. more
Infamous heavyweight boxer Mike Tyson once said "everyone has a plan until they get punched in the face." As any organization that has faced a cyber attack will tell you, it is a lot like getting punched in the face, and if you're not ready, you might get knocked out. You've likely read recent headlines of major retailers, financial institutions, and now even universities, being hit with data breaches. As some of them have learned the hard way, it's not a question of if your organization will be attacked; it's a question of when. more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign