NameSilo

security

Spaceship Spaceship
  1. Lox

    registries CENTR: Domain name registries and online content new policy

    CENTR has published a new policy document! The first section of the paper provides an insight into how the Internet works, where online content is located and how it can be accessed, and explains the facilitating role of the domain name system (DNS). The second part of the paper looks at the...
  2. Lox

    domains Crafty Web Skimming Domain Spoofs “https”

    Earlier today, KrebsOnSecurity alerted the 10th largest food distributor in the United States that one of its Web sites had been hacked and retrofitted with code that steals credit card and login data. While such Web site card skimming attacks are not new, this intrusion leveraged a sneaky new...
  3. Lox

    domains Crafty Web Skimming Domain Spoofs “https”

    Earlier today, KrebsOnSecurity alerted the 10th largest food distributor in the United States that one of its Web sites had been hacked and retrofitted with code that steals credit card and login data. While such Web site card skimming attacks are not new, this intrusion leveraged a sneaky new...
  4. Lox

    interviews Interview: Paul Vixie, CEO, Farsight Security

    In his company’s suite in a hotel in San Francisco, Infosecurity met with Farsight Security CEO Paul Vixie, who said he was in a mood that has caused him “wake up angry.” He was referring to overnight reports of a variation of Mozart “which uses DNS to get its commands.” He said that any botnet...
  5. Lox

    interviews Interview: Paul Vixie, CEO, Farsight Security

    In his company’s suite in a hotel in San Francisco, Infosecurity met with Farsight Security CEO Paul Vixie, who said he was in a mood that has caused him “wake up angry.” He was referring to overnight reports of a variation of Mozart “which uses DNS to get its commands.” He said that any botnet...
  6. Lox

    information AFRINIC: Research paper on Internet routing security

    Internet routing security has been a hot topic for many years. Can a new series of protocols released by the Internet Engineering Task Force (IETF) to operate via a framework known as the Resource Public Key Infrastructure (RPKI) provide the solution to internet users’ security fears...
  7. Lox

    information AFRINIC: Research paper on Internet routing security

    Internet routing security has been a hot topic for many years. Can a new series of protocols released by the Internet Engineering Task Force (IETF) to operate via a framework known as the Resource Public Key Infrastructure (RPKI) provide the solution to internet users’ security fears...
  8. Lox

    domains 670+ Subdomains of Microsoft are Vulnerable to Takeover

    If a subdomain is vulnerable to controlling by another persons excluding system authorities, its called as subdomain takeover. It may happen because of expired hosting services or DNS misconfigurations. Attacker will has full-privilege on the system after tookover the subdomain. Attacker can...
  9. Lox

    domains 670+ Subdomains of Microsoft are Vulnerable to Takeover

    If a subdomain is vulnerable to controlling by another persons excluding system authorities, its called as subdomain takeover. It may happen because of expired hosting services or DNS misconfigurations. Attacker will has full-privilege on the system after tookover the subdomain. Attacker can...
  10. Ja Kai

    Should Afternic use txt record verification - Poll

    I think Joe Styler is providing talking points because NOT providing txt record verification, makes his and godaddy's job easier and more profitable - as it won't piss off HUGE and others. Well, lets take a poll - I believe @Joe Styler is wrong here. Basing his responses NOT on facts. OK...
  11. Ja Kai

    Should Afternic use txt record verification - Poll

    I think Joe Styler is providing talking points because NOT providing txt record verification, makes his and godaddy's job easier and more profitable - as it won't piss off HUGE and others. Well, lets take a poll - I believe @Joe Styler is wrong here. Basing his responses NOT on facts. OK...
  12. Lox

    domains Finchloom launches PhishPrevent to Combat Hacking

    Finchloom Launches Security Service 'PhishPrevent' - Using Technology, A.I. and Humans to Combat Hacking Finchloom, a 100% Microsoft Cloud Partner and value-added reseller of Microsoft subscriptions, today launched Finchloom PhishPrevent. This fully managed security service provides...
  13. Lox

    domains Finchloom launches PhishPrevent to Combat Hacking

    Finchloom Launches Security Service 'PhishPrevent' - Using Technology, A.I. and Humans to Combat Hacking Finchloom, a 100% Microsoft Cloud Partner and value-added reseller of Microsoft subscriptions, today launched Finchloom PhishPrevent. This fully managed security service provides...
  14. Lox

    information We found 6 critical PayPal vulnerabilities – and PayPal punished us for it

    When our analysts discovered six vulnerabilities in PayPal – ranging from dangerous exploits that can allow anyone to bypass their two-factor authentication (2FA), to being able to send malicious code through their SmartChat system – we were met with non-stop delays, unresponsive staff, and lack...
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back