Tag: domain

  • Spam is mostly noise and that makes measuring it very difficult

    A recent blog post published by Recorded Future looked at the possible effect of the GDPR on the volume of spam and concludes there has been no noticeable impact. The question behind the post is a valid one: more privacy-friendly WHOIS records, inspired by the EU’s data protection regulation, could make it easier for spammers…

  • Spam is mostly noise and that makes measuring it very difficult

    A recent blog post published by Recorded Future looked at the possible effect of the GDPR on the volume of spam and concludes there has been no noticeable impact. The question behind the post is a valid one: more privacy-friendly WHOIS records, inspired by the EU’s data protection regulation, could make it easier for spammers…

  • VB2014 paper: We know it before you do: predicting malicious domains

    Wei Xu and his colleagues attempt to block domains before they’re used for bad purposes. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘We know it before you do: predicting malicious domains’ by…

  • VB2014 paper: Design to discover: security analytics with 3D visualization engine

    Thibault Reuille and Dhia Mahjoub use DNS data to look for clusters of malicious domains. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Design to discover: security analytics with 3D visualization engine’ by…

  • VB2014 preview: Design to discover: security analytics with 3D visualization engine

    Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Design to discover: security analytics with…

  • Spammers using Google open redirect

    Vulnerability ‘not worthy of bug bounty program’. Researchers at Solera Labs have discovered spammers using an open redirect at Google to hide the final destination of their link from both users and filters. Open redirects on a domain allow for the creation of redirects to arbitrary third-party sites. They are usually enabled by a site’s…

  • Significant rise in Chinese phishing sites

    Phishers shown to care little about domain names. In its latest ‘Global Phishing Survey’, the Anti-Phishing Working Group (APWG) reports a significant increase in phishing sites targeting Chinese Internet users. The report mentions 112,000 different phishing attacks in the first six months of 2011, compared to just 42,000 in the previous six months. This rise…

  • Google delists all .co.cc domains from its index

    Large fraction of sites deemed ‘spammy or low-quality’. Google has removed all sites running on subdomains of .co.cc from its search engine index as the company believes too large a fraction of them are used for spam or are otherwise of low quality. co.cc uses the top-level domain of the Australian territory of the Cocos…

  • Spammers exploit internationalized domain names

    Non-Latin characters in URLs used to trick filters. By using internationalized domain names (IDN), spammers manage to avoid detection of URLs in their messages. IDNs were introduced in 2003 and allow for domain names in non-Latin alphabets, such as Russian, Chinese and Arabic, as well as in Latin with diactitics. On top of that, last…