Categories: Domains

Cybersecurity Company Asks ICANN To Establish a Mechanism Against Cyberthreats

<div>&NewLine;<p>With cyberattacks becoming a routine in the business and private sector&comma; certain procedures and tactics are being implemented to ensure that both are kept safe&period; In fact&comma; the Internet Corporation for Assigned Names and Numbers &lpar;ICANN&rpar; has recently come into the limelight with their new approach to security online&period; In a general sense&comma; ICANN helps the internet as we know it to operate efficiently and smoothly by keeping databases and domain systems error-free and prompt&period; However&comma; among the information that they regulate is a personal piece of data that can be tied back to each domain that has an online foothold&period; To put it simply&comma; each website&comma; business&comma; blog or review website that we visit is associated with a person or company that registered that domain in its early days&period; Through <a title&equals;"Who Maintains The WHOIS Database" href&equals;"https&colon;&sol;&sol;domainnamestat&period;com&sol;blog&sol;who-maintains-the-whois-database">ICANN and WHOIS<&sol;a> database privacy&comma; this information can be attained by anyone from the general public&period;<&sol;p>&NewLine;<h2>The Double-Edged Sword<&sol;h2>&NewLine;<p>But as we soon find out&comma; WHOIS database privacy and registry information acts as a double-edged sword&period; Although many security <a title&equals;"Professionals That Benefit From a WHOIS Database Download" href&equals;"https&colon;&sol;&sol;domainnamestat&period;com&sol;blog&sol;professionals-that-benefit-from-a-whois-database-download">researchers and professionals use this information<&sol;a> to deem a domain trustworthy or problematic&comma; hackers and crackers may rely on this data to scheme an attack&period; Hackers and would-be criminals could use the WHOIS data to pinpoint their attacks at targeted individuals that may have pertinent information regarding a certain database&period; This can manifest itself in <a title&equals;"spear phishing" href&equals;"https&colon;&sol;&sol;searchsecurity&period;techtarget&period;com&sol;definition&sol;spear-phishing" target&equals;"&lowbar;blank" rel&equals;"noopener">a spear phishing attack<&sol;a> on a CEO or CTO&comma; finding out what software the company is using for their data storage or even contact information for social engineering&period;<&sol;p>&NewLine;<div class&equals;"pic-wrapper"><img src&equals;"data&colon;image&sol;gif&semi;base64&comma;R0lGODlhAQABAIAAAAAAAP&sol;&sol;&sol;ywAAAAAAQABAAACAUwAOw&equals;&equals;" fifu-lazy&equals;"1" fifu-data-sizes&equals;"auto" fifu-data-srcset&equals;"https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;75&resize&equals;75&ssl&equals;1 75w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;100&resize&equals;100&ssl&equals;1 100w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;150&resize&equals;150&ssl&equals;1 150w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;240&resize&equals;240&ssl&equals;1 240w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;320&resize&equals;320&ssl&equals;1 320w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;500&resize&equals;500&ssl&equals;1 500w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;640&resize&equals;640&ssl&equals;1 640w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;800&resize&equals;800&ssl&equals;1 800w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;1024&resize&equals;1024&ssl&equals;1 1024w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;1280&resize&equals;1280&ssl&equals;1 1280w&comma; https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1&w&equals;1600&resize&equals;1600&ssl&equals;1 1600w" title&equals;"Hackers cyber threat and security at risk" fifu-data-src&equals;"https&colon;&sol;&sol;i0&period;wp&period;com&sol;domainbox&period;io&sol;wp-content&sol;uploads&sol;2022&sol;01&sol;hackers-cyber-threat-and-security-at-risk&period;jpg&quest;ssl&equals;1" &sol;><&sol;div>&NewLine;<h2>Light In the Darkness<&sol;h2>&NewLine;<p>Although intensive domain name database privacy sounds like the perfect <a title&equals;"Cyber attacks are shutting down countries&comma; cities and companies&period; Here’s how to stop them" href&equals;"https&colon;&sol;&sol;www&period;weforum&period;org&sol;agenda&sol;2018&sol;06&sol;how-organizations-should-prepare-for-cyber-attacks-noam-erez&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">solution to cyber threats<&sol;a>&comma; it creates an advantage for prospective attackers to remain anonymous&period; WHOIS data&comma; in its general sense&comma; could act as validation for specific brands&comma; businesses and individuals that operate within the digital realm on a regular basis&period; When a <a title&equals;"The Ultimate Guide to the WHOIS Database" href&equals;"https&colon;&sol;&sol;domainnamestat&period;com&sol;blog&sol;the-ultimate-guide-to-the-whois-database">user performs a search for a domain&&num;8217&semi;s credentials<&sol;a> and finds that they&&num;8217&semi;re associated with trusted and respected businesses&comma; they&&num;8217&semi;re more likely to engage with them&period; Conversely&comma; the new laws that regulate and hide this information from the public creates a sense of mystery and protection for individuals that wish to steal information&period;<&sol;p>&NewLine;<p>To illustrate how this works&comma; we can simply take a look at the average user&&num;8217&semi;s spam folder&period; If you&&num;8217&semi;re using a mainstream email provider like Gmail or Yahoo&comma; you will notice a large accumulation of spam that gets collected during the week&period; These messages are tested against WHOIS data to see whether the contents of that email are malicious or legitimate&period; With new restrictions in domain name database privacy and available information&comma; more spam will make its way into our lives&period; This will inevitably get ugly when more of the general population&comma; including privately-owned businesses and operations&comma; fall victim to outside attacks&period; With great information comes great responsibility&comma; and many legitimate security researchers are worried about the stability of technology and user safety moving into the future&period;<&sol;p>&NewLine;<&sol;div>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;domainnamestat&period;com&sol;blog&sol;cybersecurity-company-asks-icann-to-establish-a-mechanism-against-cyberthreats">Go to Source<&sol;a><br &sol;>&NewLine;Author&colon; admin<&sol;p>&NewLine;

Sponsored
Share it:
DomainBox Admin

Recent Posts

Icon.com Sold for $12 Million in 6th Largest Publicly Reported Domain Sale of All Time

In a post on LinkedIn today Icon CEO Kennan Davison revealed that his company paid $12 million to acquire the exact match…

1 month ago

Awesome Domaining 🏷️

A curated list of resources for domain investors ("domainers"), curated in the spirit of Awesome…

2 months ago

OpenAI Buys Chat.com, Redirected to ChatGPT

OpenAI has acquired Chat.com, a domain name previously purchased for $15.5 million by HubSpot’s co-founder…

10 months ago

10 Best Domain Registrars for 2025 (Updated)

This article provides a breakdown of the top 10 best domain registrars for 2025 (updated…

10 months ago

Key Aspects for Implementing a Successful Radio Advertising Campaign for Personal Injury Attorneys

In light of how radio advertising influences Personal Injury Attorney selection, we thought a logical…

1 year ago

How Radio Advertising Influences Personal Injury Attorney Selection

How Radio Advertising Influences Personal Injury Attorney Selection Radio advertising plays a significant role in…

1 year ago
">

This website uses cookies.