WHOIS: identification or correlation?
Recently, WHOIS data was used to uncover a large cluster of domains used for a fake URL-shortener scheme and a massive SMS phishing operation, known as Prolific Puma. Spamhaus Technology's Head of Data Carel Bitter explores why this case is particularly interesting and the role of WHOIS data in identification ... Read More
DNS abuse: ICANN call for action – but is it enough?
ICANN's proposed amendments to registry and registrar contracts (RARAA), tackle DNS abuse head on, a positive step in the fight against internet abuse and cybercrime. But, are they enough? Read our thoughts here ... Read More
Let’s talk about the danger of residential proxy networks
In our experience, residential proxies are an often overlooked security threat; one that can be very difficult to remediate for the end user who -in our experience- is entirely unaware of its existence ... Read More
Top 10 tips (+1) for running your own mail server
Here are 11 ways to help email administrators make running their own email infrastructure a success ... Read More