Analysis of Domain Names with “Obamacare” and Affordable Care Act (ACA):

More Registrations, But So Far, Little Fraud Last month we wrote about the launch of the Affordable ...
threat-intelligence-insights

LinkedIn’s New App Introduces Broad Range of Security, Compliance Risks

In an ambitious attempt to further integrate its services into the lives of business professionals, ...
threat-intelligence-insights

New gTLDs: What’s Your Plan to Protect Your Brand? Part II

In our previous blog post, we discussed the current timeline for the introduction of new generic ...
threat-intelligence-insights

New gTLDs: What’s Your Plan to Protect Your Brand? Part I

Last year we posted a series of blog articles on common questions and the potential impact to ...
threat-intelligence-insights

Bakken Shale Boom Creates Security Challenges for Energy Industry

The continuing boom in the shale gas industry has created new opportunities as well as new security ...
threat-intelligence-insights

Ten Physical Security Tips for Mobile Devices

There have been numerous articles written about security vulnerabilities in mobile devices and the ...
threat-intelligence-insights

Bitsquatting Explained in 900 Words or Less: Part III

In Tuesday's blog post we discussed what bitsquatting is and how it happens. But how can ...
threat-intelligence-insights

Bitsquatting Explained in 900 Words or Less: Part II

In our previous blog post, we explained what bitsquatting is and how it happens. But how often does ...
threat-intelligence-insights

Bitsquatting Explained in 900 Words or Less: Part I

Bitsquatting is a relatively new term derived from combining the phrases "bit flipping" and ...
threat-intelligence-insights

Nothing New Under the Sun: Hacktivists Exploited Tried and True Methods to Compromise Media Websites

A wise man once said, "There is there is nothing new under the sun." This has been proven true ...