Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

IP spoofing is a cyberattack technique that entails using a device or a network to fool users into thinking the attacker is part of a legitimate entity. Often, cybercriminals use this method to access computers in a target network to obtain sensitive information, turn systems into zombies, or launch a denial-of-service (DoS) attack. more

CSC at RSA and the Cybersecurity Tech Accord Reception

CSC is a signatory of the Cybersecurity Tech Accord. If you are attending RSA in San Francisco, please join us at the Cybersecurity Tech Accord Reception on Tuesday, February 25, at 5:30 p.m. more

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Typosquatting is also known as "URL hijacking," and for good reason. Just as hijackers unlawfully seize a vehicle, typosquatters take over a domain name and use it for malicious activities. more

Domain Squatting Disputes: How WHOIS Lookup Tools Can Help

Reverse domain name hijacking (RDNH) can be considered a severe threat to any honest-to-goodness small business or your average website owner. more

Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?

One of the first go-to resources for law enforcers and cybercrime investigators is the WHOIS database. WHOIS domain search tools such as WHOIS Lookup provide rich information about a particular domain name or IP address. more

How to Avoid Fraudulent Classifieds Sites with WHOIS Domain Name Search Tools

When visitors fail to recognize that the site they visit is a fraudulent copy of that of a famous brand, they can expose themselves to cybercrime and other attacks. As part of these attacks, typosquatting is a common technique that hackers use to lure victims. They create websites that very closely resemble that of the brand they are trying to hijack so the victims would not have a clue that it is fake. more

How Domain Reputation API Can Help Detect HTTPS-Protected Phishing Sites

Over the past five years, the Internet has seen the mass migration of websites from HyperText Transfer Protocol (HTTP) to its extension, HTTP Secure (HTTPS). HTTPS is a communication protocol that encrypts the data exchanged between sites and user agents. more

Reverse Domain Hijacking and the Use of WHOIS and Domain Brand Monitoring Tools

In a Uniform Domain-Name Dispute-Resolution Policy (UDRP) case, the complainant usually has to prove three elements to win. Failing to satisfy these evidentiary requirements can render the case not only null and void, but the panel may also consider it as a reverse domain name hijacking (RDNH) instance. more

DNS Hijacking: The Iranian Cybersecurity Threat That May Be Overlooked

The Iran geopolitical crisis will have unseen consequences on businesses worldwide. Last weekend, the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) issued an alert highlighting some of these business risks. more

Addressing Cybersquatting Dangers Using Brand Alert API and WHOIS Lookup

While other organizations also hear Uniform Domain Name Dispute Resolution Policy (UDRP) cases, the World Intellectual Property Organization (WIPO) is the largest. more