Cracks and keygens have long been a problem for software vendors in that they allow users to install their products without needing to pay for a legitimate license. As the Internet and website development advanced and became more accessible, the number of sites offering software cracking tools grew. more
Alabama has linked to the dotVOTE (.VOTE) movement to cut down on the confusion that voters may encounter if they move from one state to another and need information on voter registration. more
Today, when people ask me how my role leading the Registry team at Neustar compares to my military days, it's actually not difficult to draw a few parallels. The haircuts are different and the 'uniforms' are not as uniform but at the end of the day, people are people. And working with people to achieve a mission is the same no matter what field you are in. more
Targeting governments the world over in cyber attacks is not a novel concept. Doing that using mobile apps, however, is quite new as a tactic. And that's what Cyble researchers reported as Gigabud RAT's modus operandi - trailing its sights on citizens of Thailand, the Philippines, and Peru who use government-owned institutions' mobile apps. more
While it's true that the lines between cybersecurity roles have become blurred, some have more significant barriers to entry. The field of digital forensics and incident response (DFIR), in particular, is an altogether different beast. more
A bulk whois lookup of domain names similar to the official website of the Florida Statewide Medicaid Managed Care (SMMC) Program -- www[.]flmedicaidmanagedcare[.]com -- indicates that a typosquatting event, or a cybersquatting one at the very least, might be at play. more
Radix's domain extension .space surpassed 125,000 registrations in just about a year from launch and is all set for its next big mission - growing customer awareness. more
Imagine that your registrar informs you the domain you've been eyeing would soon become available for purchase. That's good news. However, your security adviser told you to make sure a domain is threat-free before you buy it. more
Everyone hates spam. Even worse is malware - something that infects your computer and sends spam out to you and others or tries to hack into systems. In response to these problems, many people began to maintain lists recording who generates spam and malware. more
Although the market has never seen hundreds of new Top-Level Domains (TLDs) launched in rapid succession, it has experienced many new TLD launches, and each applicant should study these as they develop their volume estimates. more
Rogue bulletproof hosts are part and parcel of the cybercriminal market that is hidden deep underground. Without means to easily evade detection, attribution, and incarceration, many of today's cybercriminals would not be able to continue their malicious operations. more
While other organizations also hear Uniform Domain Name Dispute Resolution Policy (UDRP) cases, the World Intellectual Property Organization (WIPO) is the largest. more
Afilias, a leading provider of Internet infrastructure services, announced that Black Lotus Communications has selected Afilias' FlexDNS Platform to provide DNS infrastructure in support of its distributed denial-of-service (DDoS) protection solutions. more
A few weeks back, we added unpublicized artifacts to the list of indicators of compromise (IoCs) published by both FireEye and Open Source Context back in December 2020. Some would have thought that would put a stop to the havoc the SolarWinds threat actors have been wreaking, but the group targeted Malwarebytes just recently according to a company report. more
Targeted attacks are known as some of the most destructive cyber attacks in that they zoom in on organizations that either provide critical services or have massive user bases. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign