Caldwell comes to Neustar from the National Geographic Society, where he served as President and Chief Digital Officer since 2008 and oversaw National Geographic's global digital media business and initiatives. more
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), collectively called "intrusion detection and prevention systems (IDPSs)," monitor network traffic to stave off unauthorized access. Roughly speaking, an IDS detects possible malicious network activities, while an IPS stops malicious traffic from entering and possibly damaging a network. more
DNS abuse combined with redirection seems to be gaining popularity as a stealth mechanism. We've just seen Decoy Dog employ the same tactic. More recently, a still-unnamed JavaScript (JS) malware has been wreaking havoc among WordPress site owners by abusing Google Public DNS to redirect victims to tech support scam sites. more
Once active, .host aims to be the preferred domain extension for web hosts, ASPs, ISVs, cloud service providers, data centers and other entities within the web hosting industry. more
.online Sunrise closes with 775 Sunrise registrations, breaks Sunrise record of popular TLDs like .london, .nyc, .news, .club etc. Radix predicts 15,000+ registrations at the launch of General Availability. more
Verisign has released its Q4 2014 DDoS Trends Report providing a unique view into DDoS attack trends from mitigations on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of iDefense Security Intelligence Services. more
Liberty Front Press is a fake news network that has been operating since Trump's administration and was said to be designed to leverage liberal resentment against the former U.S. president while promoting pro-Iranian foreign policy narratives via social media. more
Earlier this week, a new variant of MegaCortex ransomware was found encrypting files and changing victims' passwords on Windows-based computers. Victims who fail to pay the ransom were as usual threatened that their personal data would be released. How does the attack work? more
The introduction of hundreds of new Top-Level Domains (TLDs) is an exciting time for consumers, businesses, and the Internet community as a whole. However, malicious actors seeking new channels to pursue their activities are also rubbing their hands together with the launch of these TLDs. more
Outsourcing may not always have had the best connotation. In the context of cybersecurity, however, the activity is a vital one and often even the only real alternative for many small- and medium-sized organizations. more
Many domain names are registered each day and so become part of the Domain Name System (DNS). In fact, research shows that at least two new registrations are seen per second. Although most of these are done for commercial and other legitimate purposes, not everyone who registers a domain has good intentions. more
For several years, digital security relied on a simple strategy – gain insight from past events, learn from them, and base security protection accordingly. more
The Pioneer lineup includes big international names like MediaTemple, Bluehost, OVH, Arvixe, and the UK2 Group, in addition to regional leaders such as Natro (Turkey) and UOL (Brazil), HostPapa (Canada), Blacknight (Ireland). more
Rogue bulletproof hosts are part and parcel of the cybercriminal market that is hidden deep underground. Without means to easily evade detection, attribution, and incarceration, many of today's cybercriminals would not be able to continue their malicious operations. more
Verisign just released its Q2 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of customers of Verisign DDoS Protection Services. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign