Whois

Sponsored
by

Noteworthy

Domain Research and Monitoring: Keeping an Eye on the Web for You

Reverse WHOIS: A Powerful Process in Cybersecurity

WHOIS History API: Powering Domain Investigations

Blogs

More Privacy for Domain Registrants – Heightened Risk for Internet Users

A recent exchange on CircleID highlighted a critical need for data to inform the debate on the impact of ICANN's post-GDPR WHOIS policy that resulted in the redaction of domain name registrant contact data. A bit of background: in my original post, I made the point that domain name abuse had increased post-GDPR. A reader who works with a registrar (according to his bio) commented: "Can you back up that statement with data? Our abuse desk has actually seen a reduction in abuse complaints." more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

The End of the Road: ICANN, Whois, and Regulation

There's a well-documented crisis facing the domain name system: very few who rely on domain name registration data from the Whois database to perform vital functions can do so any longer, which is escalating consumer harm and abuse on the internet worldwide. And the problems, thanks to ICANN's overly restrictive policy post-GDPR and a failing policy process, are piling up. more

The Utility Formerly Known As WHOIS

Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

How Domain Data Helps Thwart BEC Fraud

It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

8th Registration Operations Workshop (ROW), May 9th, 2019, Bangkok

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 8th ROW will be held in Bangkok, Thailand on Thursday, May 9th, 2019 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more

Domain Related Crime: The 4 Steps of Effective Investigations

There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more

Investigating Domain Name Crime: Challenges and Essential Techniques

Who would think that so much could go wrong with something as seemingly innocent as a domain name? As cybercrime continues to evolve, causing devastating reputational and financial losses to businesses and organizations, web addresses are used as a weapon -- and it's not always easy to notice their many faces. In this article, let's take a look at the domain name crime landscape, discuss the current challenges investigators and legitimate registrants face, and talk about some useful techniques. more

US Government to ICANN - Move Quickly

David Redl has written to ICANN in relation to the ongoing work around whois and GDPR. The letter, which was shared with the GNSO Council last night, is a mixed bag. On the one hand, it offers the carrot in relation to what's been done so far, but then there's the not so veiled threat, which isn't a revelation by any means, of "domestic legislation." more

Still No Access to WHOIS Data

The ICANN 64 meeting in Kobe concluded two weeks ago, and we are no closer to accessing WHOIS data critical for law enforcement, cybersecurity threat investigators, intellectual property owners, or other consumer protection advocates who rely on the data to act quickly against online abuse in the domain name system. Instead of a balanced approach to WHOIS that serves the public interest, the ICANN Board is set to approve a new global policy that fails to even fully acknowledge critical... more

The EPDP on Generic Top-Level Domain Registration Data: Phase 1 Down, Phase 2 To Go

The ICANN community recently gathered in Kobe, Japan for its first meeting of the year and it was certainly a busy week for attendees. Much of the meeting centered around the work of the Expedited Policy Development Process (EPDP) to address gTLD registration data. As a member of the EPDP team, we had been hard at work since being formed in August of 2018. Just prior to the Kobe meeting, we published the phase 1 Final Report. more

How to Track Online Malevolent Identities in the Act

Want to be a cybersleuth and track down hackers? It may sound ambitious considering that malevolent entities are extremely clever, and tracing them requires certain skills that may not be easy to build for the typical computer user. But then again, the best defense is offense. And learning the basics of sniffing out cybercriminals may not only be necessary nowadays, it has become essential for survival on the Web. So where can you begin? more

WHOIS Detractors and Advocates: Today's Viewpoints Post-GDPR

Opposing parties continue to debate whether WHOIS should stay after the General Data Protection Regulation (GDPR) took effect across the EU in May 2018. While the Internet Corporation for Assigned Names and Numbers (ICANN), which oversees WHOIS, is looking for ways to be GDPR compliant, experts from various fields are contemplating the problems pointed out by officials. more

Once Upon an EPDP

The new year has only just begun, but the work of ICANN's Expedited Policy Development Process for gTLD Registration Data (EPDP for short) is already in full swing. The team just wrapped up several days of meetings in Toronto and I thought it would be a good time for an update on where we are in the process. Before I go any further, I would be remiss if I didn't again take the opportunity to thank the ICANN team supporting our efforts. more

News Briefs

New Zealand’s Domain Name Commission Wins Appeal in Lawsuit Against US DomainTools

Domain Registrars Given a Six-Month Deadline to Implement Registration Data Access Protocol (RDAP)

EU Should Not Be Setting US WHOIS and Privacy Policy, Says MPAA

Easy Access to ICANN, IP Address Data Beats Info on Encrypted Data, Says Telstra Cybersecurity Head

New Zealand's Domain Name Commission Wins Injunction in a Lawsuit Against DomainTools

Special Interests Circulating Draft Legislation to Cut Short ICANN's Whois Policy Process

Former ICANN Senior Vice President Kurt Pritz to be Named Chair of Whois Group

DomainTools Sued for Misusing New Zealand's .NZ Domain Name Registration Information

Anti-Phishing Working Group Proposes Use of Secure Hashing to Address GDPR-Whois Debacle

European Data Regulators Throw ICANN Back to the Drawing Board for a Third Time on Whois Privacy

ICANN Files Legal Action Against Domain Registrar for Refusal to Collect WHOIS Data

Domain Name Registrars Ask ICANN for a "Moratorium" on Its New GDPR Policy

A Short-Term Suspension of GDPR Enforcement on WHOIS May Be Necessary, Says U.S. Government

ICANN Releases Temporary WHOIS Specification Plan for GDPR Compliance With Deadline Two Weeks Away

ICANN CEO "Cautiously Optimistic" EU to Provide Clear Guidance for Domain Industry GDPR Compliance

ICANN's GDPR Compliance Model for Whois Unlikely to Be Implemented in Time for May 25 Deadline

Dutch Geographic TLDs Refuse Public Access to Whois Data

Thick Whois Policy for .COM Goes Live

U.S. Bypassing ICANN on Whois Privacy With Closed-Door Meeting in Paris

ICANN Must Make User Privacy a Central Tenet for New Registrations, Says EFF

Most Viewed

North Dakota Judge Gets it Wrong

Network Solutions Responds to Front Running Accusations

Help! My Domain Name Has Been Hijacked!

Whois Privacy vs. Anonymity

Domain Name Registrar Allows Completely Blank WHOIS

Most Commented

Fake Bank Site, Fake Registrar

When Registrars Look the Other Way, Drug-Dealers Get Paid

Who Is Blocking WHOIS? Part 2

ICANN Complaint System Easily Gamed

Domain Name Registrar Allows Completely Blank WHOIS

WhoisXML API Updates – Sponsor

Do Security Service Providers Need Their Own Data Scientists?

In a world where society is driven by information, data science has gained solid ground over the past years for its ability to separate the wheat from the chaff. Its predictive power is now being explored in the context of cybersecurity. After all, efficient threat protection requires gathering and interpreting the enormous amounts of traffic generated to and from one's network. more

Can Security Analytics Combat Digital Fraud with IP and Domain Name Monitoring?

For several years, digital security relied on a simple strategy – gain insight from past events, learn from them, and base security protection accordingly. more

What to Look for in Digital Forensics and Incident Response Experts

While it's true that the lines between cybersecurity roles have become blurred, some have more significant barriers to entry. The field of digital forensics and incident response (DFIR), in particular, is an altogether different beast. more

Carpet-Bombing Attacks: A Rising Threat to ISPs

News of a South African ISP's two-day outage sent the industry abuzz last month, highlighting the need for improved distributed denial-of-service (DDoS) attack mitigation. more

Information Rights Management or User Access Management, Which One Is Better?

The current security landscape calls for intensive monitoring and analysis to effectively identify possible threats to applications, systems, and infrastructure. With millions of threats discovered monthly, security experts must revamp and update their cybersecurity measures and tools. more

Online Streaming: Boon or Bane to the Media Industry and Digital Rights Management?

Copyright infringement laws have become less effective due to the ease of sharing content over the Web. Music streaming services, for example, have increased music consumption and the overall industry revenue, but it also has lessened album sales and song downloads. more

Why Companies Should Strive to Stay on Google's Good Side

Imagine that your registrar informs you the domain you've been eyeing would soon become available for purchase. That's good news. However, your security adviser told you to make sure a domain is threat-free before you buy it. more

Industry Updates

Participants – Random Selection