The Web's Shadiest Neighborhoods: What You Need to Know

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next The Web's Shadiest Neighborhoods: What You Need to Know-4 Next

Malicious Activity

Malicious activity continues to increase.

Dr. Egon Spengler might as well have been describing malicious web activity when he said, "Well, let's say this Twinkie represents the normal amount of psychokinetic energy in the New York area. Based on this morning's sample, it would be a Twinkie... thirty-five feet long, weighing approximately six hundred pounds."

That's a big Twinkie. And a big dose of malicious activity dominating shady TLDs, namely, scams, spam, suspicious activity and potentially unwanted software (PUS). Most of these websites are being leveraged by attackers in spam and scams and to distribute potentially unwanted software. Others are related to search engine optimization/ positioning or other "junk sites" that would be classified as suspicious.

Much like in the streets of New York City in "Ghostbusters," suspicious activity is happening in varying degrees all over the web. The relative risk of visiting a website in a "shady" neighborhood can vary dramatically depending on who is managing the "residents" there.

What many users may not realize is that the letters following the "." in a website address represent a top-level domain (TLD) – essentially a "neighborhood" of addresses – maintained by a specific company or group. Ideally, TLDs would all be run by security-conscious operators who diligently review new domain name applications, and reject those that don't meet a stringent set of criteria.

Unfortunately, the reality for many of these new neighborhoods is that they go unpoliced, like Slimer wreaking havoc on the 12th floor of the Sedgewick Hotel. To avoid getting slimed, businesses and consumers need guidance to understand how safe, or how shady, these new TLDs may be considered for web security purposes.

Courtesy of Blue Coat research, let's take a closer look at the web's shadiest neighborhoods.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.