Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Ubuntu: 1610-1: Linux kernel vulnerability

Oct16
by Ike on October 16, 2012 at 9:01 am
Posted In: Uncategorized

(Oct 12) The system could be made to perform privileged actions as an administrator.

└ Tags: Linux, vulnerability
 Comment 

Ubuntu: 1611-1: Thunderbird vulnerabilities

Oct16
by Ike on October 16, 2012 at 9:01 am
Posted In: Uncategorized

(Oct 12) Several security issues were fixed in Thunderbird.

 Comment 

Red Hat: 2012:1364-01: bind97: Important Advisory

Oct16
by Ike on October 16, 2012 at 9:01 am
Posted In: Uncategorized

(Oct 12) Updated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More…]

└ Tags: Red Hat, security, update
 Comment 

Red Hat: 2012:1363-01: bind: Important Advisory

Oct16
by Ike on October 16, 2012 at 9:01 am
Posted In: Uncategorized

(Oct 12) Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More…]

└ Tags: Red Hat, security, update
 Comment 

Domain Registration Risk Service now available

Oct15
by Ike on October 15, 2012 at 3:15 pm
Posted In: Netcraft Services

The Domain Registration Risk Calculator is a tool for domain registrars to
analyse the likelihood that new domains will be used for fraudulent activities. The
service identifies domains which are deceptively similar to legitimate websites run
by banks and other institutions commonly targeted by phishing attacks.

Since such registrations are often made using stolen credit cards,
there are significant advantages to the registrar in refusing them.

Netcraft has blocked well over five million phishing attacks since 2005, and our phishing feed
is used by all of the major web browsers, and also by leading anti-virus companies,
domain registrars, registries, certificate authorities and hosting companies.
Our extensive experience in identifying, validating and eliminating phishing sites has provided
us with a wealth of knowledge of the tricks that are used
by fraudsters to create a deceptive domain name. We analyse our database of over six thousand organisations
which have been targeted by
phishing attacks to extract a comprehensive set of homoglyphs that could be used to convert
bona fide domains to fraudulent ones. Example transformations are the corresponding
characters from an IDN alphabet, or ASCII character set substitutions such as replacing “o”
(letter O) with “0” (zero), or replacing “l” (lower-case letter l) with “1” (digit
one), or simply appending or prepending strings such as update or secure.

A Facebook phishing site, along with its Domain Registration Risk score

The service computes a registration risk score for a proposed domain, which gives a
measure of the likelihood that this candidate domain may be used to host a
phishing attack. We do this by using the results of two algorithms:

  • The first algorithm, Phish target score compares the candidate domain to each of the frequently-phished legitimate domains we have on record. This comparison is done on a per-character basis, and the score is formed by looking at the minimum set of edits required to map from one to the other.

    The algorithm recognises certain tricks commonly used in domain names to deceive victims, such as double letters (paaypal.com) or confusing characters or combinations of characters (paypa1.com). We also check against a list of deceptive prefixes and suffixes that are frequently used by phishing sites, including signin and verify.

    As well as using a set of fixed rules, this algorithm also retains the flexibility to match new mappings and edits that have not been seen before. Using the suggested cut-off of a minimum score of 5/10, this method identifies 278 (12.7%) out of the 2,191 phishing domains currently blocked by Netcraft.

  • The second algorithm, String entropy score, works entirely differently. Many phishing domains in our database are essentially random strings of alphanumeric digits, yet very few legitimate sites follow this pattern. The string entropy test looks to see if a domain looks like a combination of real dictionary words and plausible names, or whether it looks more like a randomised string. The higher the score, the more random a string appears to be.

    Although most dictionary strings score zero, the suggested cut-off is a minimum score of 5/10; any domain scoring higher than this is very likely to be random, but below this score false positives are increasingly likely.

    Using the suggested cut-off identifies 474 (21.6%) of the 2,191 identified phishing domains and these are substantially non-overlapping with those domains spotted by the first method.

These two methods work together to give sophisticated and largely
independent indicators of the likelihood that a candidate domain may be used
to host phishing attacks against a known legitimate target.
Using the overall risk rating produced by combining the two scores would
presently detect 742 (33.9%) of the 2,191 currently blocked phishing domains.

Example Domains

The domains in the table below have run phishing attacks and are shown together with their
domain registration risk.

Domain Target Registration Risk
hsbc-hk.biz hsbchk.com 10.00
activate-facebook-security-confirmation.tk facebook.com 10.00
xdzfhv.tk (none) 9.98
cimbclicksonline.com cimbclicks.com.my 9.10
jtlwm.com (none) 8.94
taobao581.cn taobao.com 8.84
halifaxinternational.org halifax.co.uk 8.67
skype-load.com skype.com 8.49
natwestt.co.uk natwest.co.uk 8.26
1tw1tter.com twitter.com 7.14
santadar.co.uk santander.co.uk 6.93
htmail.co.uk hotmail.co.uk 6.66
dhl-couriers.co.uk dhl.co.uk 5.54
sbo6666.com sbo666.com 5.64
alibabeexpress.com alibaba.com 5.07

The Interface

A web-based interface to the system is available for evaluation purposes and ad-hoc queries. For automated processes and bulk queries an API is available to return domain registration risk information in JSON format. Bespoke formats can be made available on request.

Entering the domain securepaypa1.com into the test system produces the report shown below:

More Information

Please get in touch
([email protected]) if you would like to
try out this service or for subscription information.

└ Tags: Netcraft Services
 Comment 
  • Page 2,816 of 2,985
  • « First
  • «
  • 2,814
  • 2,815
  • 2,816
  • 2,817
  • 2,818
  • »
  • Last »

What’s New?

  • Fedora 42: mingw-libsoup Critical Out-of-Bounds Read CVE-2025-11021
  • Fedora 42: mingw-python3 Critical Denial Service Fix CVE-2025-12084
  • Fedora 42: Fix for Important Integer Overflow Vulnerability in mingw-glib2
  • Fedora 43: mingw-libsoup Security Update for CVE-2025-11021 Advisory
  • Fedora 42 pgadmin4 Critical Remote Code Exec Fix 2025-b08763f674
  • Fedora: Gobuster Critical Update Released for CVE-2025-58188 Advisory
  • Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294
  • Debian Trixie WordPress Security Advisory DSA-6091-1 for CVE-2025-58246
  • Debian: Chromium Important Code Exec and Info Disclosure DSA-6089-1
  • Debian Trixie: php8.4 Important DoS Memory Disclosure DSA-6088-1
  • Fedora 42: uriparser CVE-2025-67899 Fix for Unbounded Recursion Issue
  • Fedora 42: util-linux Critical Buffer Overflow CVE-2025-14104 Advisory
  • Fedora 42: mqttcli Update 0.2.8 Critical Integer Overflow Issues
  • Fedora 42: Chromium High CVE-2025-14765 Out of Bounds Security Risks
  • Debian: Roundcube Important XSS and Information Leak Fix DSA-6087-1
  • Debian: MediaWiki DSA-6085-1 Security Updates for DoS and XSS
  • Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282
  • Plesk 2025: A Year in Review
  • Ubuntu 24.04: Linux Xilinx Important Kernel Security Fix USN-7931-4
  • Ubuntu 22.04 LTS: Linux Kernel Critical Fix for Raspberry Pi USN-7928-4
  • Ubuntu 18.04 LTS – Oracle Kernel Critical Security Flaws USN-7922-3
  • Ubuntu 24.04: Advisory USN-7921-2 for Real-time Kernel CVE-2025-39946
  • Debian Trixie: c-ares Critical Denial of Service Advisory DSA-6084-1
  • Debian: webkit2gtk Important Memory Corruption Issues DSA-6083-1
  • Fedora 42: brotli 1.2.0 Critical DoS Fix FEDORA-2025-9e233a4e22

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.448 seconds.