Malware

Malware / Industry Updates

TLD Security, Spec 11 and Business Implications

After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security. Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility. more»

Verisign iDefense 2015 Cyber-Threats and Trends

Here is an overview of the key cyber security trends we expect to see in 2015. The majority of this year's threats and trends reflect research on iDefense's core focus areas of cyber-crime, cyber espionage and hacktivism. more»

The Latest Internet Plague: Random Subdomain Attacks

DNS DDoS attacks continue, fueled by open DNS proxies. Now they're stressing resolvers and authorities worldwide using pseudo random subdomains.  more»

Digging Deep Into DNS Data Discloses Damaging Domains

A Terabyte stream of anonymized DNS data collected every day from around the world reveals lots of interesting things. Nominum researchers have developed algorithms to sort through trillions of transactions and find what is usually a tiny fraction that aren't legitimate. more»

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. more»

Reducing the Risks of BYOD with Nominum's Security Solution

In previous posts, Pat Barnes has discussed the risks associated with BYOD, and a DNS-based approach for reducing those risks. Essentially this approach consisted of making use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more»

Nominum Releases New Security Intelligence Application

The Security Intelligence application provides comprehensive threat visibility by using continuously updated data to provide up-to-the-minute in-network protection and reporting for an organization's network and customers against the latest Internet threats. more»

Our New Initiatives To Combat Botnets

We often throw around the term "bots" in our industry. Short for "robots," it's the common term for software programs that run automated tasks. In many cases, bots can be innocuous and even useful. more»

Q1 2012 Fraud Intelligence Report

Phish attack volume jumped 28% from the previous quarter to 166,022 attacks. The MarkMonitor Fraud Intelligence Report for the first quarter of 2012 is now available.  more»

How Secure is Your Mobile Network? And Does It Even Matter? (Webinar)

Once thought to be a safe haven for data activity and an afterthought for criminals, mobile networks have become the new market for hackers and thieves. Mobile is the growth market of the future. Let’s make sure it’s not just a growth market for illegal activity. more»