Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Google Windows

40% of Malicious URLs Were Found on Good Domains (helpnetsecurity.com) 75

Help Net Security shared an interesting statistic from the 2019 Webroot Threat Report. 40 percent of malicious URLs were found on good domains. Legitimate websites are frequently compromised to host malicious content.

To protect users, cybersecurity solutions need URL-level visibility or, when unavailable, domain-level metrics, that accurately represent the dangers.

The report also found that while Google was the single most impersonated brand in phishing, 77% of all phishing attacks impersonated financial institutions. (The good news? After 12 months of security awareness training, end users were 70% less likely to fall for phishing attacks.)

And Windows 10 devices were "at least twice as secure as those running Windows 7. Webroot has seen a relatively steady decline in malware on Windows 10 machines for both consumer and business."
This discussion has been archived. No new comments can be posted.

40% of Malicious URLs Were Found on Good Domains

Comments Filter:
  • But I'm pretty sure a hosts file will protect you from all that...
    • Unless I take the list of evil URLs and make my boss's hosts file point everything at them. Naw, I'd *never* do such a thing.

  • Browsers need URL level visibility. Anything that obscures the URL in the browser should be fixed. Mouse-over should always display what is about to be clicked.

    • Does that include all the shit loaded behind the scene by javascript?

      It's gonna be a mighty long list of URLs to read through for every page...

  • If the link matches this REGEX, it's almost certainly for a compromised site: /\/wp-(includes|content)\/(images|uploads?|themes|plugins|cache)\//

    Whatever claims and advances WordPress makes in the realm of security, it is FAR too easy for people to configure it a way to store malware, and redirections to same. Any "deep linking" to one suspicious at best.

    Of course, if a link uses a "shortened URL", its probability of legitimacy is rather low, too.

    • Of course, if a link uses a "shortened URL", its probability of legitimacy is rather low, too.

      Wonderful story. Our local UNI has decided that too many people click on phishing emails and hand over their login details, so ALL must start using 2FA.

      The URL they distributed to provide information about this new requirement was 1. a shortened URL, 2. from a ccTLD that has no connection at all with the UNI, and 3. misspells the name of the UNI's animal mascot so it fits with the ccTLD.

      In other words, if an email from my university contains a shortened URL that misspells the mascot and comes out of a co

  • and social media company is a good domain?

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...