Malware

Malware / Industry Updates

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons. more»

Introducing the Verisign DNS Firewall

Verisign DNS Firewall is an easy-to-configure, cost effective managed cloud-based service that offers robust protection from unwanted content, malware and advanced persistent threats (APTs), delivered with the ability to customize filtering to suit an organization's unique needs. more»

TLD Security, Spec 11 and Business Implications

After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security. Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility. more»

Verisign iDefense 2015 Cyber-Threats and Trends

Here is an overview of the key cyber security trends we expect to see in 2015. The majority of this year's threats and trends reflect research on iDefense's core focus areas of cyber-crime, cyber espionage and hacktivism. more»

The Latest Internet Plague: Random Subdomain Attacks

DNS DDoS attacks continue, fueled by open DNS proxies. Now they're stressing resolvers and authorities worldwide using pseudo random subdomains.  more»

Digging Deep Into DNS Data Discloses Damaging Domains

A Terabyte stream of anonymized DNS data collected every day from around the world reveals lots of interesting things. Nominum researchers have developed algorithms to sort through trillions of transactions and find what is usually a tiny fraction that aren't legitimate. more»

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. more»

Reducing the Risks of BYOD with Nominum's Security Solution

In previous posts, Pat Barnes has discussed the risks associated with BYOD, and a DNS-based approach for reducing those risks. Essentially this approach consisted of making use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more»

Nominum Releases New Security Intelligence Application

The Security Intelligence application provides comprehensive threat visibility by using continuously updated data to provide up-to-the-minute in-network protection and reporting for an organization's network and customers against the latest Internet threats. more»

Our New Initiatives To Combat Botnets

We often throw around the term "bots" in our industry. Short for "robots," it's the common term for software programs that run automated tasks. In many cases, bots can be innocuous and even useful. more»