Recent Articles

Part 2: Hacker Movies (and Cybersecurity Concerns) Go Mainstream

Part 2: Hacker Movies (and Cybersecurity Concerns) Go Mainstream

| January 22, 2015 | 0 Comments

The early reviews of Blackhat are in, and it doesn’t look favorable. Maybe Hollywood will have better luck depicting cybercrime on television with shows like Scorpion and the upcoming CSI: Cyber. But in any case, we’ll tread on with our 3 part series of movie reviews. In our previous post about Tron and WarGames, we […]

Continue Reading

Retail Priorities On Display at NRF’s Big Show

Retail Priorities On Display at NRF’s Big Show

| January 21, 2015 | 0 Comments

Continue Reading

Part 1: Hacking the Movies, Then and Now

Part 1: Hacking the Movies, Then and Now

| January 15, 2015 | 0 Comments

When we use the words “hacking” and “movies” in the same sentence, we’re not talking about the Sony incident last year.  We’re talking about hacker movies like the upcoming Universal Pictures, Michael Mann production of Blackhat, starring Thor himself. The movie comes out this Friday, and the previews look interesting enough and hopefully the premise and […]

Continue Reading

Domain Profile Information Helps Fight Hacking, Cyber Espionage

Domain Profile Information Helps Fight Hacking, Cyber Espionage

| December 2, 2014 | 0 Comments

If you’re a regular reader of our blog, you know that we often take a bit of a lighthearted look at the ways that domain data aids various kinds of investigations. However, there’s really nothing funny about hacking, cyber espionage, or all-out cyber warfare. The outstanding investigative team at FireEye has recently published reports on […]

Continue Reading

Holy Whois, Batman! Beware Phony Domain Registrants

Holy Whois, Batman! Beware Phony Domain Registrants

| November 25, 2014 | 0 Comments

If you’ve spent much time looking at domain records to hunt down or characterize cybercriminals, you have almost certainly encountered some clearly falsified domain registrations. We decided to have a little fun by digging into some (ahem) unlikely domain registrants showcased below, with some more serious points about domain registration and cybercrime along the way. […]

Continue Reading

Notes from the field: SecureWorld Seattle

Notes from the field: SecureWorld Seattle

| November 18, 2014 | 0 Comments

SecureWorld puts on several shows throughout the year, but everyone says the Seattle show is “the one to be at.” And after attending our second straight SecureWorld Seattle conference, we thought we’d share with you a few notes on the event. DomainTools was well-represented with a new booth and an energetic delegation. There was no way you could […]

Continue Reading

Usability and Navigation Improvements to DomainTools Website

Usability and Navigation Improvements to DomainTools Website

| November 12, 2014 | 0 Comments

If you’ve visited DomainTools today, you might have noticed a few not-so-minor changes. We’ve spent some time recently improving the usability and ease in navigating our site. We focused on getting you to the tools and data you use with fewer clicks and less scrolling. Our most noticeable changes are the header and footer across […]

Continue Reading

See you at SecureWorld!

See you at SecureWorld!

| November 6, 2014 | 0 Comments

If you’re in the Seattle area, and you’re attending SecureWorld in Bellevue, let us know! We’re excited to be participating in this event for a second year. The topics are spot on, the agenda and speakers look interesting, and it’s in our backyard…all great reasons for sending a big entourage to the event. Come by […]

Continue Reading

Mining Domain Data to Predict Badness

Mining Domain Data to Predict Badness

| October 15, 2014 | 1 Comment

We are freshly back from MIRcon 2014, the annual security show put on by Mandiant. MIRcon has become a significant cybersecurity trade event, with hundreds of participants from the private sector as well as government/military. Different tracks of presentations cover security R&D, management/policy, and incident response. Keynotes were given by Mandiant founder Kevin Mandia, former […]

Continue Reading

Stars of Cybersecurity Rock Austin

Stars of Cybersecurity Rock Austin

| September 30, 2014 | 0 Comments

The Institute of Electrical and Electronics Engineers, better known as IEEE, has developed a new series of shows with the theme of “Rock Stars.” These shows gather experts in the show’s topical area (Big Data, Mobile Cloud, Cybersecurity) for informational seminars and panel discussions, along with informal networking opportunities. And lest you find hardcore geekery […]

Continue Reading