The Web's Shadiest Neighborhoods: What You Need to Know

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next The Web's Shadiest Neighborhoods: What You Need to Know-6 Next

Top 10 Shady TLDs

The web's top 10 TLDs with shady sites.

Based on analysis of web requests from more than 15,000 worldwide businesses and 75 million users, Blue Coat researchers have created a list rating the web's shadiest TLDs. You're bound to find your fair share of ectoplasmic residue (Ghost slime) polluting these neighborhoods.

Much like in the streets of New York City in "Ghostbusters," suspicious activity is happening in varying degrees all over the web. The relative risk of visiting a website in a "shady" neighborhood can vary dramatically depending on who is managing the "residents" there.

What many users may not realize is that the letters following the "." in a website address represent a top-level domain (TLD) – essentially a "neighborhood" of addresses – maintained by a specific company or group. Ideally, TLDs would all be run by security-conscious operators who diligently review new domain name applications, and reject those that don't meet a stringent set of criteria.

Unfortunately, the reality for many of these new neighborhoods is that they go unpoliced, like Slimer wreaking havoc on the 12th floor of the Sedgewick Hotel. To avoid getting slimed, businesses and consumers need guidance to understand how safe, or how shady, these new TLDs may be considered for web security purposes.

Courtesy of Blue Coat research, let's take a closer look at the web's shadiest neighborhoods.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.