The Web's Shadiest Neighborhoods: What You Need to Know

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next The Web's Shadiest Neighborhoods: What You Need to Know-4 Next

Malicious Activity

Malicious activity continues to increase.

Dr. Egon Spengler might as well have been describing malicious web activity when he said, "Well, let's say this Twinkie represents the normal amount of psychokinetic energy in the New York area. Based on this morning's sample, it would be a Twinkie... thirty-five feet long, weighing approximately six hundred pounds."

That's a big Twinkie. And a big dose of malicious activity dominating shady TLDs, namely, scams, spam, suspicious activity and potentially unwanted software (PUS). Most of these websites are being leveraged by attackers in spam and scams and to distribute potentially unwanted software. Others are related to search engine optimization/ positioning or other "junk sites" that would be classified as suspicious.

Much like in the streets of New York City in "Ghostbusters," suspicious activity is happening in varying degrees all over the web. The relative risk of visiting a website in a "shady" neighborhood can vary dramatically depending on who is managing the "residents" there.

What many users may not realize is that the letters following the "." in a website address represent a top-level domain (TLD) – essentially a "neighborhood" of addresses – maintained by a specific company or group. Ideally, TLDs would all be run by security-conscious operators who diligently review new domain name applications, and reject those that don't meet a stringent set of criteria.

Unfortunately, the reality for many of these new neighborhoods is that they go unpoliced, like Slimer wreaking havoc on the 12th floor of the Sedgewick Hotel. To avoid getting slimed, businesses and consumers need guidance to understand how safe, or how shady, these new TLDs may be considered for web security purposes.

Courtesy of Blue Coat research, let's take a closer look at the web's shadiest neighborhoods.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.