ICANN's New Domain WHOIS Verification - The Policy and Procedures

ICANN’s New Domain WHOIS Verification – The Policy and Procedures

What Are the New Domain Policy and Procedures to About ICANN’s WHOIS Verification? The Internet Corporation for Assigned Names and Numbers (“ICANN”), is an international non-profit corporation that plays one important role in the internet governance ecosystem. Moreover, this ranges from the Internet Protocol (IP) address space allocation, protocol identifier assignment, generic (gTLD) and country…

Confidential Information Possibly Compromised in Malware Attack

Confidential Information Possibly Compromised in Malware Attack

Another Incident of a Malware Attack Potentially Compromising Private Information A malware attack has reportedly hit an outsourced Australian-based vendor in Singapore. Consequently, it may have compromised confidential information of applicants for public-service jobs. According to reports, the main victims were users of the Careers@Gov online portal, where vacancies are listed and applicants invited for…

DigiCert Completes Its Acquisition of Symantec

DigiCert Completes Its Acquisition of Symantec

DigiCert Acquisition of Symantec: What Can We Expect in the Coming Years Leading cybersecurity company, Symantec recently announced that it has sold it’s public key infrastructure (PKI) technologies and website security to DigiCert. The latter is a leading provider of scalable security solutions. The landmark sale was for a whopping USD$950 million along with a…

How GDPR Will Affect Your Domain Name?

How GDPR Will Affect Your Domain Name?

GDPR Will Affect Your Domain Name Potentially Due to Accessing WHOIS Data For many of us, we are not familiar with the term GDPR (General Data Protection Regulation). GDPR is basically a European regulation that aims to strengthen protection for the use and storage of a person’s data. Even before it’s introduction last month, there…

HTTPS: A Game Changer of Your SEO Strategy

HTTPS: A Game Changer of Your SEO Strategy

HTTPS SEO Strategy: Is it Really Feasible to Get SSL Certificates Or Just a Costly Add-on? The Secure Hypertext transfer protocol (HTTPS) was created to do similar tasks as HTTP with the additional layer of protection – it leverages Secure Sockets Layer, or SSL, to create an encrypted channel to allow authorization and completely secure…

Twitter Users Urged To Change Passwords Following Expose

Twitter Users Urged To Change Passwords Following Expose

Major Bug Prompted Twitter Users To Change Passwords For Security Purposes Twitter has since urged its more than 330 million users to immediately change their passwords after a bug exposed them in plain text. According to reports, an investigation revealed there was no evidence of a breach or misuse of the unmasked passwords. However, as…

Server Virtualization for Better Companies of Tomorrow

Server Virtualization for Better Companies of Tomorrow

Why Server Virtualization Relevant in Today’s Improving Technology? Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. It benefits the administrators of a system where users need to be separate from one another and from the original server. In a…

Four Universities in Singapore Hacked

Four Universities in Singapore Hacked

Hacking into the Universities in Singapore: Is There a Laxity in Security? An Iranian hacking syndicate has allegedly attacked four universities in Singapore and pilfered more than 31 terabytes of academic data and intellectual property from varsities all over the world. According to reports, the breach affected 52 staff accounts including: Nanyang Technological University (NTU)…