Neustar has launched a new program to allow partners to resell Neustar's cloud-based infrastructure services, including managed DNS and DDoS protection offerings, to their online customers. more
Neustar has a vested interest in ensuring that the domain name system is as secure and stable as possible. We have been operating top level domains (TLDs) for more than a decade, and we intend to provide the same level of service as the back-end registry provider for more than 350 applicants for the new generic TLDs that we hope will become available in the coming months. more
It is quite natural to get prompts from software manufacturers saying you need to update your installed apps every so often for better security or to fix bugs. But you should know, too, that threat actors often use program update notifications as malware distribution vehicles. more
As we head into 2010, it's no secret that the issues of security and the prevention of internet identity theft in all its forms are of critical importance. .ORG, the Public Interest Registry, was honored to host the First .ORG Forum in Washington, D.C. more
The ability to retrieve historical WHOIS information can be essential for the cybersecurity community, particularly when it comes to threat hunting and cybercrime investigation. This investigative capability is highlighted in our latest downloadable white paper "Digging Up Zombie Domains: What WHOIS History Reveals about 3,800+ Verified Phishing Hosts" where we analyzed thousands of verified phishing hosts and their historical WHOIS records. more
.store which entered the sunrise phase on the 6th of April, is already slated to make its mark in the Top 10 new gTLDs in terms of sunrise performance, standing at the 515 sunrise order with 5 days of the sunrise remaining. more
BlueCat Networks, the IPAM Intelligence company, today announced a new 5x7 standard Customer Care program to deliver five-hour on-site repair, seven days a week for its new lineup of IP Address Management (IPAM), DNS and DHCP hardware appliances. more
After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security. Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility. more
In the recent ado.com UDRP decision, the panel made the speculative and factually incorrect finding that a "high" asking price indicated bad faith targeting of a trademark. The UDRP is intended to address clear-cut cases of cybersquatting, not to second guess the asking prices set on inherently valuable domains in an open and competitive marketplace. more
On 9 March 2022, the Cybersecurity and Infrastructure Security Agency (CISA) added 98 indicators of compromise (IoCs) to their Conti ransomware alert page. WhoisXML API researchers examined these flagged domain names for recurring characteristics to uncover more artifacts. more
Agent Tesla, an infamous data stealer, has been plaguing Internet users since 2014. Much has been revealed about the malware, but the world didn't come to know about one of its more adept campaign perpetrators -- Hagga -- until last year. more
UltraDNS today announced that salesforce.com, leading on-demand Customer Relationship Management (CRM) provider has secured its DNS with UltraDNS managed services. more
The November 2021 PhishLabs Quarterly Threat Trends & Intelligence Report indicated the finance, social media, and telecommunications industries as phishers’ most targeted sectors. Last month, we analyzed a squatting campaign targeting U.S. Bancorp to determine if other banks were at risk, this time we’ll look into the top 3 phishing industry target – telecommunications. more
A group of researchers recently discovered a new Android banking Trojan they called "Revive" since threat actors designed it to restart if it stops working. Once a device is infected, hackers can intercept messages, including online banking one-time passwords (OTPs). Revive also enables attackers to steal login credentials since it can read and store everything the user types on the infected device. more
I spend a lot of time talking with customers about how they choose their managed DNS provider. In listening to their stories over the years, I have noticed that many of them use similar (if not identical) criteria to make this very important decision. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC