Data Revelations – Nominum Data Science Security Report

New technology hacker cyber crime in cyberspace

From the front lines of the war on cybercrime, Nominum discovers new trends in ransomware, phishing, IoT-related threats and more. We analyzed 15.3 trillion DNS queries to produce this 46-page report that delves into the mind of a cybercriminal.

DNS offers a unique position from which to examine the inner workings of cybercrime because 90% of malware relies on it for exploitative purposes. This report is a culmination of several months of detailed analyses from a sample that represents approximately 3% of total global internet traffic.

Read the report to learn:

  • Why growth in malicious domain queries has jumped over 400% in one year
  • How the attack landscape is expanding because of IoT
  • Why PRSD attacks have grown by over 65% in a three-month period

We examine trends such as the commercialization of malware, which is contributing to the meteoric rise in cybercrime. Princeton University professor Nick Feamster provides expert commentary on IoT trends and the role of DNS in the early detection of threats.

Read the report now to understand the threats businesses, consumers and networks face, and the unique methods DNS can employ to predict and prevent cyberthreats.

Please fill in the short form below to receive a copy of this whitepaper - Fields labelled with * are mandatory. By downloading this whitepaper you agree to be subject to the Third Party Disclosure section of our privacy policy available here and consequently we may share your details with sponsors of this whitepaper and use your information to send you targeted promotions. You can opt out of these at any time.

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Should privacy be treated as a right to protect stringently, or a commodity for users to trade for benefits?

Loading ... Loading ...