Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Phishing Alerts for Domain Registries

Oct25
by Ike on October 25, 2012 at 9:21 am
Posted In: Netcraft Services

Monitor phishing within your top-level domains

While some registries still perceive phishing as a content issue for hosting companies and registrars, detailed knowledge of phishing activity within their Top Level Domain(s) is very beneficial for registries. It is a key data source for identifying problematic, negligent, or fraud-friendly registrars, and an essential tool for maintaining the reputation of a TLD.

It is common for hosting companies and domain registrars to unknowingly allow their infrastructure to be used for phishing. Even seemingly respectable companies may develop a reputation as a haven for fraud though some systematic deficiency in their working practices, such as a low level of resourcing for abuse related workflow (particularly outside core working hours and during weekends), or inexperienced or less capable staff being unable to recognise and act on fraudulent content.

The most prolific hosts of .net phishing sites, October 2012

Conversely, some criminal registrars and hosting companies specialise in hosting fraudulent content, and even go so far as to advertise their services as “bullet-proof”. Bullet-proof hosting companies are typically based in jurisdictions where laws may be hard to apply, and being in an informed position to decline further business from these registrars may greatly aid operational efficiency.

Professionally validated feed, relied upon throughout the Industry

Netcraft’s continuously updated, professionally validated phishing feed is used throughout the Internet Infrastructure industry. In addition to Internet registries, all of the main web browsers, along with major anti-virus companies, firewall vendors, SSL Certificate authorities, large hosting companies and domain registrars use Netcraft’s feed to protect their user communities. Since Netcraft first launched its anti-phishing system in 2005, over 5.2 million unique phishing sites have been detected and blocked as of September 2012.

Reporting and Analysis

Reports can be refreshed hourly, and also trended over time periods of many months, with analysis by registrar, hosting company, name server, country or phishing target.

.net phishing sites by country, October 2012

Real-time Alerts

When Netcraft validates a phishing report in your TLD, you can receive an alert and can also arrange for alerts to be passed through to registrars. Acting on these individual alerts will demonstrate that your top-level domains are not welcoming to fraud. Fraudsters adjust to these signals within a short period of time, and are themselves quite efficient at moving their operations away from parts of the DNS where they are clearly unwelcome.

A refreshable Excel spreadsheet includes details of the phishing sites under the .net TLD

Case Study – Nominet .uk

Nominet is the registry responsible for managing the .uk domain, which is one of the largest ccTLDs with over 10 million domains registered as of March 2012. Netcraft has provided Nominet with information on phishing using .uk domains since 2009, with alerts made available to individual registrars via an opt-in service.

More information

Please contact us ([email protected]) for pricing or further details about any of our services.

└ Tags: Netcraft Services
 Comment 

Parallels Plesk Panel 11.0.9 MU#21

Oct25
by Ike on October 25, 2012 at 7:06 am
Posted In: Plesk, Releases

The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.

└ Tags: exploit
 Comment 

Parallels Plesk Panel 8.6.0 MU#20

Oct25
by Ike on October 25, 2012 at 7:03 am
Posted In: Plesk, Releases

The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.

└ Tags: exploit
 Comment 

Parallels Plesk Panel 10.4.4 MU#46

Oct25
by Ike on October 25, 2012 at 7:01 am
Posted In: Plesk, Releases

The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.

└ Tags: exploit
 Comment 

Parallels Plesk Panel 9.5.5 MU#8

Oct25
by Ike on October 25, 2012 at 7:00 am
Posted In: Plesk, Releases

The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.

└ Tags: exploit
 Comment 
  • Page 2,809 of 2,986
  • « First
  • «
  • 2,807
  • 2,808
  • 2,809
  • 2,810
  • 2,811
  • »
  • Last »

What’s New?

  • Fedora 42: roundcubemail Important XSS Fix with Advisory ID 2025-fec36f9eaf
  • Fedora 42: Fix for Critical 7-Zip Remote Code Execution in RetroArch
  • Fedora 42: mingw-libsoup Critical Out-of-Bounds Read CVE-2025-11021
  • Fedora 42: mingw-python3 Critical Denial Service Fix CVE-2025-12084
  • Fedora 42: Fix for Important Integer Overflow Vulnerability in mingw-glib2
  • Fedora 43: mingw-libsoup Security Update for CVE-2025-11021 Advisory
  • Fedora 42 pgadmin4 Critical Remote Code Exec Fix 2025-b08763f674
  • Fedora: Gobuster Critical Update Released for CVE-2025-58188 Advisory
  • Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294
  • Debian Trixie WordPress Security Advisory DSA-6091-1 for CVE-2025-58246
  • Debian: Chromium Important Code Exec and Info Disclosure DSA-6089-1
  • Debian Trixie: php8.4 Important DoS Memory Disclosure DSA-6088-1
  • Fedora 42: uriparser CVE-2025-67899 Fix for Unbounded Recursion Issue
  • Fedora 42: util-linux Critical Buffer Overflow CVE-2025-14104 Advisory
  • Fedora 42: mqttcli Update 0.2.8 Critical Integer Overflow Issues
  • Fedora 42: Chromium High CVE-2025-14765 Out of Bounds Security Risks
  • Debian: Roundcube Important XSS and Information Leak Fix DSA-6087-1
  • Debian: MediaWiki DSA-6085-1 Security Updates for DoS and XSS
  • Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282
  • Plesk 2025: A Year in Review
  • Ubuntu 24.04: Linux Xilinx Important Kernel Security Fix USN-7931-4
  • Ubuntu 22.04 LTS: Linux Kernel Critical Fix for Raspberry Pi USN-7928-4
  • Ubuntu 18.04 LTS – Oracle Kernel Critical Security Flaws USN-7922-3
  • Ubuntu 24.04: Advisory USN-7921-2 for Real-time Kernel CVE-2025-39946
  • Debian Trixie: c-ares Critical Denial of Service Advisory DSA-6084-1

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.258 seconds.