Cybersecurity

Sponsored
by

Cybersecurity / News Briefs

Coalition Recommends Tools to Combat Phishing

ISPs and e-commerce sites can employ more tools to combat phishing scams, including "white lists" of legitimate Websites and using false identification information to scam the scammers, according to a report released Thursday.

The report, released by a coalition of consumer groups, technology vendors, financial services organizations and law enforcement agencies, also calls on Internet companies to step up their consumer education efforts. more

Opposition to ICANN-VeriSign Proposal Grows

Eight of the world's largest domain registrars have sent an open letter to ICANN Chairman Vint Cerf, stating their formal opposition to the revised proposition with VeriSign for continued control of the Internet registry.

The eight signatories, which lay claim to 25 million domain names, or 57 percent of those currently registered, are GoDaddy, Network Solutions, Tucows, Register.com, BulkRegister, Schlund + Partner AG, Melbourne IT and Intercosmos Media Group.
 more

Effects of Domain Hijacking Can Linger

Malicious hackers who are able to hijack an organization's Web domain may be able to steal traffic from the legitimate Web site long after the domain has been restored to its owner, according to a recent report.

Design flaws in the way Web browsers and proxy servers store data about Web sites allow malicious hackers to continue directing Web surfers to malicious Web pages for days or even months after the initial domain hijacking. more

Telecom Regulatory Authority of India Recommends IPv6 Transition

Faced with increasing demand for Internet protocol addresses, better quality of service and security, the Telecom Regulatory Authority of India (Trai) today recommended a transition from the existing version of internet protocol (IPv4) to the next-generation IPv6 platform.

The regulator has proposed the setting up of a National Internet Registry (NIR) in the country, within the framework of the Asia Pacific Network Information Centre (APNIC), and the Regional Internet Registry, utilizing the existing set-up of National Internet Exchange of India (NIXI). Currently all users in India buy their Internet protocol addresses from the APNIC. more

Phishing Attacks Evolved Steadily Throughout 2005 Security

Phishing attacks are continually evolving, as fraudsters develop new strategies and quickly refine them in an effort to stay a step ahead of banking customers and the security community. Here are some of the phishing trends and innovations we noted in 2005...

Open redirects became a favorite method for phishing attacks to "borrow" the URL and credibility of a trusted web site. Redirects are common on large web sites, where server side scripts are employed to redirect users to different parts of the site. more

US Warns of Fake Net Domain Data

More than 5% of the net's most popular domains have been registered using "patently false" data, research shows.

A US congressional report into who owns .com, .net and .org domains found that many owners were hiding their true identity. The findings could mean that many websites are fronts for spammers, phishing gangs and other net criminals. more

Industry Updates

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

CSC at RSA and the Cybersecurity Tech Accord Reception

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Domain Squatting Disputes: How WHOIS Lookup Tools Can Help

Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?

How to Avoid Fraudulent Classifieds Sites with WHOIS Domain Name Search Tools

How Domain Reputation API Can Help Detect HTTPS-Protected Phishing Sites

Reverse Domain Hijacking and the Use of WHOIS and Domain Brand Monitoring Tools

DNS Hijacking: The Iranian Cybersecurity Threat That May Be Overlooked

Addressing Cybersquatting Dangers Using Brand Alert API and WHOIS Lookup

Retrospective: Post-GDPR Compliance Rates for Domain Enforcement

Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags

Reverse Domain Name Hijacking: What It Is and How to Avoid It through a Domain Availability Check

The Need for Email Address Verification in Light of Subpoena-Themed Phishing Attacks

Mobile Apps Take the Lead, Scammers Follow