Industry

Latest

Legal Services as a Phishing Target: How Domain Reputation Checks Can Help

The legal sector has become a favored target of phishing campaigns. 80% of law firms reportedly received phishing emails in 2018. And in 2017, the success of these phishing campaigns was 300% higher than in 2016. more

Neustar Providing Growth, Security and Performance to .vu ccTLD After Successful Registry Transition

Following several months of hard work and preparation between Neustar and The Office of the Vanuatu Telecommunications, Radiocommunications and Broadcasting Regulator (TRBR), we are excited to announce the successful migration of the .vu ccTLD onto Neustar's Registry platform. more

Reverse Domain Name Hijacking: What It Is and How to Avoid It through a Domain Availability Check

Deciding on a domain name is both an exciting and challenging task that every website owner must undertake. A good domain name must sound interesting and be easy to remember while echoing the nature of the business. more

Verisign Q3 2019 Domain Name Industry Brief: Internet Grows to 359.8 Million Domains in Q3 of 2019

Verisign today released the latest issue of the Domain Name Industry Brief, which shows that the third quarter of 2019 closed with 359.8 million domain name registrations across all top-level domains (TLDs), an increase of 5.1 million domain name registrations, or 1.4 percent, compared to the second quarter of 2019. more

The Need for Email Address Verification in Light of Subpoena-Themed Phishing Attacks

At the most basic level, the Internet consists of interconnected networks that communicate using standard protocols such as the Border Gateway Protocol (BGP) and the Domain Name System (DNS). As such, it is built on trust or an honor system – trust that routing requests received from another network are valid, and the traffic sent in response to requests is legitimate. more

Mobile Apps Take the Lead, Scammers Follow

Mobile commerce has just reached another landmark milestone. For the first time ever, mobile transactions made up almost $1 of every $3 spent online during the post-Thanksgiving 2019 shopping weekend. more

The High Cost Of Privacy In A Post-GDPR World

It has officially been over a year since the European Union's General Data Protection Regulation (GDPR) took effect and in that time, we've come to see both the benefits, and the very serious drawbacks of this program. more

How Threat Intelligence Software Can Help Prevent Breaches Caused by Server Misconfigurations

Early this month, the Gekko Group, an AccorHotels subsidiary erroneously uploaded more than 1TB of confidential information on a publicly accessible cloud-based server. This error led to the exposure of tons of data owned by its partner hotels' clients, travel agencies, and customers. more

Neustar Collaborates With auDA to Increase Resilience, Availability and Diversity of the .au Domain

Neustar announced today that they have commenced working with the .au Domain Administration (auDA) to increase the resilience, availability, and diversity of Australia's .au country code Top-Level Domain (ccTLD) zone, by adding additional DNS name servers. more

The Louisiana State Ransomware Attack: Enhancing Cyberdefense with Reverse IP Address Lookup

An attempted ransomware attack on some Louisiana state servers caused the state's cybersecurity team to shut down their IT systems and websites. Governor John Bel Edwards, however, emphasized that not all of the state's servers were affected. more

How Can Domain Intelligence Analysis Help in Vetting Third-Party Providers

For 16 months, PayMyTab, a third-party payment provider, leaked the private data of customers who dined in a U.S. restaurant when it failed to follow a simple yet essential security protocol. more

Using Threat Intelligence Feeds to Prevent Orcus RAT Infections

John Paul Revesz (also known as "Armada"), the Canadian behind the Orcus RAT (a software that been used in various malware attacks), has been charged under Section 342.1 of the Criminal Code on November 8. The specific section is for the unauthorized use of a computer, and at its core, this is what Revesz's Orcus software does. more