Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

Internet and Mobile Exploitation of the Coronavirus

Following our initial blog on the subject of Internet sites and domains seeking to profit from the ongoing COVID-19 health crisis, we dug deeper into the topic. Appdetex looked at keywords within domain names, website content, social media handles and marketplace listings that would likely be related to the coronavirus outbreak. Though the result of this work is related to a very limited set of keywords, the quantities of results delivered are statistically significant in many cases.

Prevent Network Users from Visiting Fake Domains and Settlement Pages with WHOIS Lookups

Typosquatting is a malicious tactic that cyberattackers employ to entrap users who mistype web addresses on their browsers. Often, mistyped domain addresses redirect to copycats of legitimate sites and are owned by threat actors.

How IP Geolocation Lookups Help Thwart Cyber Attacks

Cyber attacks can hit any organization and even derail its operation on a grand scale. Just recently, ISS World, a facility management service provider with clients in more than 70 countries worldwide, released a statement where it mentions being the victim of a malware attack.

Why Typosquatting Protection Is a Must for Settlement Pages

The Telephone Consumer Protection Act (TCPA) is a federal statute that restricts telemarketers from making automated and unsolicited calls as well as sending faxes and messages to people. Affected individuals may choose to file a complaint and collect a minimum of US$500 for each illegal communication received.

Phishing Attacks Still Haunt Banking Institutions: How Can Domain Reputation Checks Help?

Phishing attacks continue to post an upward trend. Over the years, phishers have improved their methods, using very convincing domains to bait victims into their schemes.

Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse

Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own to implicate a victim or move a case forward.

Fight Against Phishing: Email Address Verification as a Cybersecurity Process

Phishing keeps making much noise in the realm of cybersecurity, and not in a good way. A majority of cyber attacks start with a phishing email, making the tactic responsible, at least partially, for close to 90% of data breaches.

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

IP spoofing is a cyberattack technique that entails using a device or a network to fool users into thinking the attacker is part of a legitimate entity. Often, cybercriminals use this method to access computers in a target network to obtain sensitive information, turn systems into zombies, or launch a denial-of-service (DoS) attack.

CSC at RSA and the Cybersecurity Tech Accord Reception

CSC is a signatory of the Cybersecurity Tech Accord. If you are attending RSA in San Francisco, please join us at the Cybersecurity Tech Accord Reception on Tuesday, February 25, at 5:30 p.m.

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Typosquatting is also known as "URL hijacking," and for good reason. Just as hijackers unlawfully seize a vehicle, typosquatters take over a domain name and use it for malicious activities.