Detecting phishing websites via compression-based algorithms
The frequency of keywords affects the compression ratio on phishing websites, which provides a way to spot them.
The frequency of keywords affects the compression ratio on phishing websites, which provides a way to spot them.
Guest Post: What role does the technical community have to play when it comes to cyber norms?
Guest Post: Path-aware architectures are showing potential as means to improve efficiency and solve many of the security issues of today’s Internet.
Learn about the differences between AS0 Trust Anchor Locators and AS0 Route Origin Authorizations.
Guest Post: HTTPS RRs and STS look similar but there are subtle differences in the threat models and deployment tradeoffs of each.
APNIC’s RPKI publication service now supports the RFC 8181-aligned publication protocol and Krill system.
Guest post: Domain Name System Blocklists have their own specific advantages for inbox protection.
Guest post: If you run your own email infrastructure you will need content filtering, so get up to speed on Domain Name System Blocklists.
Adli Wahid moderated a panel discussion at the 2020 FIRST & AfricaCERT Virtual Symposium for Africa and Arab Regions, held online from 21 to 23 October 2020.
Guest post: Between data breaches and problems with third-party management, there are compelling reasons for a DIY email approach.