Abandoned domain names vs renewed domain names: any observations?

Image source: JanBaby via Pixabay As a registrar, Nameshield has an accurate view of the typology of abandoned domain names and domain names kept by their holders when they clean up their portfolio. As in all sectors of activity, phenomena that could be said to be “trendy” can even be seen in cybersquatting and therefore in domain names that are abandoned or maintained. Let’s take the example of typosquatting, there was a time when it was essential to register domain ... Read More

.ZA websites will have to propose a link towards the COVID-19 official website implemented by the government

Image source: 12019 via Pixabay Since last Thursday, the South African government has imposed to all websites using domain names in .ZA to propose a link that redirects towards the official Covid-19 information website implemented by the government:  www.sacoronavirus.co.za This new rule applies to all .ZA websites, regardless of their content. The two other extensions managed by ZADNA registry, JOBURG and .CAPETOWN are also affected by this rule. In the same logic, the registry als... Read More

Why is the sale of .ORG registry a source of debate?

In November 2019, a press release announced that .ORG registry, Public Interest Registry (PIR), a non-profit organization managed by Internet Society, is going to be sold off to Ethos Capital, a private equity firm. .ORG is the extension for non-profit organizations. The acquisition of PIR by Ethos has quickly concerned the organizations using .ORG, on the basis of the potential misuse of the extension by its new owner, which has, by its very nature, profit motives. The concern? That ... Read More

Advices on how to change the domain name without losing its referencing

Image source: DiggityMarketing via Pixabay During a rebranding for marketing purposes, in the context of a merger or an acquisition for example, a company can change its website’s domain name. At the search engines’ level, it is all the pages that change, as if this was a brand new website. Therefore, how not to lose the work done on the SEO and make a successful transition, in particular if the website is old? In the case of a rather old website with an optimal referencing on the exis... Read More

The alarming Kaspersky report: nine times more attacks aiming connected objects than in 2018

Image source: TheDigitalArtist via Pixabay Last October 15, Kaspersky, the antivirus software company, published an edifying report about the volume of cyberattacks directly aiming connected objects. Although the industry expected that this new generation of objects would be directly targeted by cyberattacks, the increase in the cyberattacks number is alarming and lets easily imagine the security flaws that the connected objects present. According to the estimation presented by Kaspers... Read More

Satori Botnet: The hacker facing up to 10 years imprisonment did not act alone

Image source: TheDigitalArtist via Pixabay We now know more about the cyberpirate, Nexus Zeta, whose real name is Kenneth Currin Schuchman, who distinguished himself with the creation of the Satori botnet. Pleading guilty to the charges regarding Satori botnet creation, his confessions describe the implementation of this attack using IoT flaws. For reminder, a botnet is a set of infected computers remotely controlled by a cybercriminal. The machines that belong to a botnet are often ca... Read More

.AU domain names soon available for registration

Image source: kitkatty007 via Pixabay Until now, Australian domain names were only available for registrations in second level extensions, in particular .COM.AU. If the decision to open the .AU registration goes back to 2015, it took four years to set the rules! It seems that starting October 1st, 2019, the holder of the existing .com.au domain name, for example forexample.com.au, will be able to apply for priority status to register the exact match of their existing name in .AU, forex... Read More

Europe decides to apply sanctions to transboundary cybercriminals

Image source: GregMontani via Pixabay On Friday May 17th, 2019, the Council of Ministers of the European Union presented the creation of a blacklist identifying the perpetrators of cybercrimes located outside the EU. Thus this is a new legal context which has been validated by the EU in order to try to reduce the continuously growing cyberattacks’ number. Now, the EU will indeed be able to sanction individuals or entities involved in the cyberattacks carried out from outside the EU. Eu... Read More

Cyberattack: G7 and France organize a cyberattack simulation in the finance industry

Image source : TheDigitalArtist via Pixabay Faced with the upsurge and the continually increasing strength of cyberattacks, a simulation exercise of a cyberattack in the finance industry will be organized by the members of the G7, the world’s major economic powers. In the French presidency context, France will be the one that will run this test in which 24 financial authorities of the 7 members of the G7 will participate during 3 days. Today it is no secret that the banking sector is o... Read More

Game of Thrones: The return of the [MALWARES] white walkers by dozens

Image source: Irfan Rafiq via Pexels As with each event where massive interest is expected, the launch of the final season of Game of Thrones is a golden opportunity for pirates. According to a Kaspersky’ study, this series would be the favorite of the cybercriminals. It represented 17% of the infected contents last year, i.e. 20 934 web users! According to this same study, the most targeted episodes are logically the first and last episodes of the season. For if the fans are many... Read More