Blog Moderator | Oct 06, 2015
Seventy-three percent of recruiters plan to invest more in social recruiting. If a hiring manager looked you up online, what would he or she find? You can give yourself that extra edge and stand out from the crowd by taking control of your digital footprint. And, the easiest way to do that? Register a domain name and secure your professional space online to show who you are and what you can offer. In fact, 56 percent of all hiring managers are more impressed by a candidate’s personal website than any other personal branding tool.
Blog Moderator | Oct 05, 2015
Cybersecurity is no longer a concern for just IT and security professionals. Recent breaches at organizations like Sony, Target, JP Morgan Chase, and numerous U.S. government entities have brought the issue of cyber-attacks very close to home. If you bank online, use your debit card at a local store or engage in any activity that relies on an Internet-connected system, you are at risk.
As part of National Cyber Security Awareness Month
(NCSAM), Verisign is joining with organizations and companies around the country to promote online safety and champion a safer, more secure and trusted Internet. Every week in October, we’ll share research and online safety tips from our resident cybersecurity experts via our blog
Danny McPherson | Oct 01, 2015
At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection.
First identified in recent days on the Chinese microblog site Sina Weibo, XcodeGhost is an infection of Xcode, the framework developers use to create apps for Apple’s iOS and OS X operating systems. Most developers download secure Xcode from Apple. However, some acquire unofficial versions from sites with faster download speeds.
Apps created with XcodeGhost contain instructions, unknown to both the app developers and the end users, that collect potentially sensitive information from the user’s device and send it to command-and-control (C2) servers managed by the XcodeGhost operator. This way, the XcodeGhost operators circumvented the security of Apple’s official Xcode distribution, and the security of Apple’s App Store.
Burt Kaliski | Sep 30, 2015
Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization
. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server,
or a referral to another name server.
Michael Kaczmarek | Sep 29, 2015
There are two types of information that can be found online about you: the information you intentionally post and the information that is automatically collected.
The information that you intentionally post is what you want everyone to know about you. Your professional life is documented on LinkedIn. Your social activities with friends and family are chronicled on Facebook. You alert the world of your immediate thoughts on Twitter. You even choose to provide your address and credit card information when buying things online. All of this personal information about you is deliberately posted and collected with your consent.
This information that you intentionally post is not the only data that exists online about you. Every day, your surfing habits are monitored and analyzed through the use of your Internet browser. Your travel is tracked by the apps you use to get directions. Your personal style preferences are monitored by the online stores you shop. This mining of your private information is automatically collected and, in many cases, far more telling than what you choose to provide yourself.Read more