Read the original article: 3 Reasons It’s Crucial to Review Your Domain Lock Portfolio Now Just as we started the new year, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency’s (CISA) issued an alert. On January 6,…
Category: CircleID: Cybercrime
What Cyber Threat Intelligence Tools Can Reveal about a Targeted Attack
Read the original article: What Cyber Threat Intelligence Tools Can Reveal about a Targeted Attack Targeted attacks are considered insidious digital threats as they may lead to debilitating data breaches with substantial financial repercussions. Apart from money lost to theft,…
Coronavirus Online Threats Going Viral, Part 5: Social Media
Read the original article: Coronavirus Online Threats Going Viral, Part 5: Social Media For our final blog in this series, looking at the online risks associated with COVID-19, we focus on social media. The popularity of social media channels means…
Coronavirus Online Threats Going Viral, Part 4: Phishing
Read the original article: Coronavirus Online Threats Going Viral, Part 4: Phishing In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage…
ICANN Org’s Multifaceted Response to DNS Abuse
Read the original article: ICANN Org’s Multifaceted Response to DNS Abuse While the March report from ICANN’s Domain Abuse Activity Reporting system show a general reduction in second-level gTLD domain names identified as being used in phishing, malware distribution, and botnet command and control, it has been…
Coronavirus-Themed Survey Scams: The Next Item on Cybercriminals’ Agenda?
Read the original article: Coronavirus-Themed Survey Scams: The Next Item on Cybercriminals’ Agenda? Having crossed the two-million mark in coronavirus infections worldwide, citizens from all nations are facing a difficult time. Sadly, cyber threats and attacks currently spreading online are…
Coronavirus Online Threats Going Viral, Part 3: Mobile Apps
Read the original article: Coronavirus Online Threats Going Viral, Part 3: Mobile Apps In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps — another digital content…
Coronavirus: Cybersecurity Implications and Fraudulent Infection Maps
Read the original article: Coronavirus: Cybersecurity Implications and Fraudulent Infection Maps The world has been on edge for the past weeks as many nations enforced mass quarantines amid the continued rise in the number of Coronavirus-infected patients. As a result,…
Google Reports 18 Million Daily COVID-19 Related Malware, Phishing Emails Per Day
Read the original article: Google Reports 18 Million Daily COVID-19 Related Malware, Phishing Emails Per Day A sample email provided by Google showing increased phishing attempts of employees operating in a work-from-home setting. During the last week, Google says it…
How to Secure Your Data During Coronavirus
Read the original article: How to Secure Your Data During Coronavirus Nobody loves a good crisis more than a hacker and, by anyone’s definition, coronavirus is a big, fat stinking crisis that almost everyone on earth is sitting in the…
Coronavirus Online Threats Going Viral, Part 2: Marketplaces
Read the original article: Coronavirus Online Threats Going Viral, Part 2: Marketplaces In this second article about the online risks of coronavirus, we take a look at online marketplaces. In the midst of the coronavirus crisis and the partial or…
Threat Intelligence: The First Line of Defense Against Data-Stealing Ransomware
The threat landscape is ever-changing. As time goes by, threat campaigns use new and more sophisticated technologies than seen before. Still, some reuse tried-and-tested methods while adding a few other functionalities, as in the case of FTCODE ransomware operators. The…
MarkMonitor Releases New gTLD Quarterly Report for Q1 2020
New gTLD Quarterly Report, Q1 2020 (Download Report)MarkMonitor has released its latest issue of the New gTLD Quarterly Report for the first quarter of 2020, noting a shift in the .Brand landscape which may mark the beginning of new trends.…
New Cyberthreats: Have You Been Exposed at Home?
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies…
COVID-19, WHOIS, and the Pressing Need for Help With Domain Name System Abuse
COVID-19, WHOIS, and the Pressing Need for Help With Domain Name System Abuse Advertise on IT Security News. Read the complete article: COVID-19, WHOIS, and the Pressing Need for Help With Domain Name System Abuse
The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud
In this time of crisis, we keep the Internet going, but also ensure it is trustworthy, open, safe and secure. As a global public health and economic crisis unfolds due to the COVID-19 pandemic, and the world’s population retreats to…
3 Ways a DNS Lookup Tool Can Help Prevent DNS Attacks
The Domain Name System (DNS) is a crucial element of the Internet and a foundation of networking. Every organization going online uses the DNS. That’s also a reason why, unfortunately, the DNS makes for a lucrative attack vector that threat…
Testing, Testing, Testing for a More Secure (Internet) World
Testing, Testing, Testing for a More Secure (Internet) World Advertise on IT Security News. Read the complete article: Testing, Testing, Testing for a More Secure (Internet) World
How a Passive DNS Database Can Help Improve Cyber Resilience
As cyberattacks become more robust and sophisticated every day, the world of cybersecurity saw the need to shift. Hence, cyber resilience became the new norm. Cyber resilience bases itself on the fact that cyber risks are no longer just IT…
COVID-19: Business and Brand Protection Response
With the COVID-19 health crisis evolving so quickly, it’s hard to predict the extent of the long-term impact on business and the economy. While every business sector is facing different considerations, it’s safe to say all are handling challenges from…
Over 360 Security Experts Around the World From Group to Combat COVID-19 Hackers, Protect Hospitals
An international group of more than 360 cyber threat intelligence researchers from over 40 countries have joined forces to help the medical sector amid the COVID-19 crisis. The group consists of a community of Cyber Threat Intelligence (CTI) experts, Incident…
How Companies Can Use the UDRP to Combat Rising COVID-19-Related Phishing
Straightforward out-of-court domain name proceeding can provide efficient relief against fraudulent websites and email. Google has seen a steep rise amid the Coronavirus pandemic in new websites set up to engage in phishing (i.e. fraudulent attempts to obtain sensitive information…
Beyond the Firewall: DNS Defenses to Manage Online Threats
Beyond the Firewall: Implementing DNS Defenses to Mitigate Online Vulnerabilities and Threats (Download Here)The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web content. When…
Good Internet Hygiene During the COVID-19 Pandemic
We are all aware of the steps for mitigating the spread of the novel coronavirus (COVID-19): • Wash your hands. • Practice social distancing. • Report exposure. But these are not the only activities to practice right now. Cyber-criminals are…
ICANN67 Round-Up
This past meeting of the Internet Corporation for Assigned Names and Numbers (ICANN), ICANN67, was intended to be held in person in Cancun, Mexico, but was actually the first meeting to be held entirely online and virtually. It was a…
Will 5G Implementation Lead to an Increase in Ransomware Attacks?
Will 5G Implementation Lead to an Increase in Ransomware Attacks? Advertise on IT Security News. Read the complete article: Will 5G Implementation Lead to an Increase in Ransomware Attacks?
Namecheap, EFF and the Dangerous Internet Wild West
This past week I had two items pop up on my alerts. The first was about Facebook suing domain registrar Namecheap for allowing domains that impersonate the social media company and can be used for scams. The second was a…
Why Are Internet Security Standards Badly Deployed and What to Do About It?
Why Are Internet Security Standards Badly Deployed and What to Do About It? Advertise on IT Security News. Read the complete article: Why Are Internet Security Standards Badly Deployed and What to Do About It?
When Proxy Services Enable Abuse
When Proxy Services Enable Abuse Advertise on IT Security News. Read the complete article: When Proxy Services Enable Abuse
Phishing Attacks Still Haunt Banking Institutions: How Can Domain Reputation Checks Help?
Phishing attacks continue to post an upward trend. Over the years, phishers have improved their methods, using very convincing domains to bait victims into their schemes. In fact, a 2019 phishing trends and intelligence report recorded a steady rise in…
Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse
Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own…
Fight Against Phishing: Email Address Verification as a Cybersecurity Process
Phishing keeps making much noise in the realm of cybersecurity, and not in a good way. A majority of cyber attacks start with a phishing email, making the tactic responsible, at least partially, for close to 90% of data breaches.…
Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19
Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19 Advertise on IT Security News. Read the complete article: Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19
The Perils of Typosquatting: The Likely Targets and the Price They Pay
Typosquatting is also known as “URL hijacking,” and for good reason. Just as hijackers unlawfully seize a vehicle, typosquatters take over a domain name and use it for malicious activities. In the end, the brand and its user base almost…
Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?
One of the first go-to resources for law enforcers and cybercrime investigators is the WHOIS database. WHOIS domain search tools such as WHOIS Lookup provide rich information about a particular domain name or IP address. With just one of these,…
Predicting the Cost of Cryptocurrency Hacks in 2020
Predicting the Cost of Cryptocurrency Hacks in 2020 Advertise on IT Security News. Read the complete article: Predicting the Cost of Cryptocurrency Hacks in 2020
Cyberspace Security in Africa – Where Do We Stand?
Cyberspace Security in Africa – Where Do We Stand? Advertise on IT Security News. Read the complete article: Cyberspace Security in Africa – Where Do We Stand?
Why Domain Name Security Matters Most?
In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity…
Doing More to Address Child Sexual Abuse Materials Online
For all of us at Public Interest Registry, working to remove child sexual abuse content from the Internet isn’t just a part of our work; it’s our moral duty. As stewards of the .ORG community, addressing the problem head on…
How Domain Reputation API Can Help Detect HTTPS-Protected Phishing Sites
Over the past five years, the Internet has seen the mass migration of websites from HyperText Transfer Protocol (HTTP) to its extension, HTTP Secure (HTTPS). HTTPS is a communication protocol that encrypts the data exchanged between sites and user agents.…
How to Avoid Fake Product Support Pages with WHOIS API’s Help
Sometimes, seeing several permutations of a famous company’s domain names is not just a mere coincidence. Often, these are typosquatting attempts. They are not merely a nuisance, either, because clicking such a URL can have severe effects. Take the cases…
The Digital Decade – A Look Ahead
As 2019 wrapped up, we took some time to reflect on some of the most impactful digital developments of the past decade and how they helped changed our digital lives, including: • The rise of mobile and tablet usage •…
Reverse Domain Hijacking and the Use of WHOIS and Domain Brand Monitoring Tools
In a Uniform Domain-Name Dispute-Resolution Policy (UDRP) case, the complainant usually has to prove these three elements to win: The disputed domain name must either be identical or confusingly similar to the complainant’s trademark. The respondent or the registrant has…
Addressing Cybersquatting Dangers Using Brand Alert API and WHOIS Lookup
While other organizations also hear Uniform Domain Name Dispute Resolution Policy (UDRP) cases, the World Intellectual Property Organization (WIPO) is the largest. We looked at the number of registered UDRP cases for 2017, 2018, and 2019 and found an upward…
Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags
Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags Advertise on IT Security News. Read the complete article: Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags
The Digital Decade – A Look Back
The Digital Decade – A Look Back Advertise on IT Security News. Read the complete article: The Digital Decade – A Look Back