25 minute discussion covering the latest in cyber threats that they track, regulatory interest observations and related reports on domain abuse, criminal domain name usage trends that propagate phishing, malware, and botnets, the issues of trust, authenticating users, how botnet command and control points work, and potential threats due to the war in Ukraine.
I’m pleased to announce a major, significant abuse management tool upgrade, from all of us at iQ, that helps in fighting abuse and building a safer internet.
I asked the question to one of the world’s most foremost experts in digital security and fighting cybercrime. Listen to the podcast.
As we are receiving abuse reports from our sources for a select group of African TLDs, I thought it would be a good time to catch up with Daniel and get his take on the latest concerning Internet usage, brand and IP protection issues, and abuse in African TLDs.
In my latest video interview and podcast for iQ, I spoke with Elizabeth Behsudi about the recently published I&JPN Toolkit on Domain Name System (DNS) Level Action to Address Abuses.
My colleage LG provides an overview of this service that is designed to allow anyone to gain daily insight into whether you or someone else has a problem with domain name abuse.
How can a registry or registrar reduce the amount of duplicative and non-actionable abuse reports? How do you get off a blacklist or bad list? Should there be evidence standards from the reputation/blacklist providers? And more…
By allowing Internet Infrastructure providers to act faster, more effectively and efficiently against scams. My interview with Jorij Abraham, director of Scamadviser.com.
If you’ve ever attended or wanted to attend Nordic Domain Days (LG’s the founder); want to hear what he has to say about challenges in trying to tackle domain name abuse and how iQ decides which abuse feeds/reputation block lists to integrate, then you may want to check out this video.
Comments related to the recently announced ICANN audit of registrar compliance with DNS security threat obligations.