Welcome!

News Feed Item

McAfee, Inc. Reveals the Riskiest Web Domains to Surf and Search

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s fourth annual Mapping the Mal Web report released today. Fifty-six percent of all risky sites end in .COM.

McAfee analyzed more than 27 million websites to uncover which domains are the most dangerous. While .COM is the riskiest top-level domain, the riskiest country domain is Vietnam (.VN). Japan’s .JP ranks as the safest country domain for the second year in a row. The report also found that 6.2 percent of the 27 million websites analyzed pose a security risk – up from 5.8 percent last year.

“This report underscores how quickly cybercriminals change tactics to lure in victims and avoid being caught,” said Paula Greve, director of web security research for McAfee Labs™. “Last year Vietnam’s .VN was a relatively safe domain, and this year it jumped to the third most dangerous domain. Cybercriminals target regions where registering sites is cheap and convenient and pose the least risk of being caught. A domain that’s safe one year can be dangerous the next.”

A top-level domain, also known as a “TLD,” is the letter code at the end of a website that indicates where the site is registered. Most people do not pay attention to the TLD suffix when they search, and many click on the first result that looks interesting. This leaves the surfer vulnerable to criminals who optimize sites for search engines and take advantages of typos such as .CM (Cameroon) instead of .COM.

Country Domain Comparisons

The report reveals drastic changes in country domain rankings with .VN (Vietnam) skyrocketing to third place, up from 39th in 2009. In fact, 58 percent of the country’s registered sites are ranked as risky. By contrast, .SG (Singapore) became safer this year, dropping to the 81st most risky domain from 10th in last year’s report. Singapore’s registration process now requires appropriate documentation when seeking to register any .SG site, which helped to improve its safety levels, according to the Singapore Network Information Center. Click here to see an interactive map of the most dangerous domains.

             

Top Five Riskiest Country Web Domains
(ranked in most risky order)

   

Overall Risk
2010

   

Overall Risk
2009

Vietnam (.VN)     29.4%     .9%
Cameroon (.CM)     22.2%     36.7%
Armenia (.AM)     12.1%     2.0%
Cocos (.CC)     10.5%     3.3%
Russia (.RU)     10.1%     4.6%
       
             

Top Five Safest Country Web Domains
(ranked in least risky order)

   

Overall Risk
2010

   

Overall Risk
2009

Japan (.JP)     .1%     .1%
Catalan (.CAT)     .1%     .1%
Guernsey (.GG)     .1%     .6%
Croatia (.HR)     .1%     .1%
Ireland (.IE)     .1%     .1%
 

Key Findings from the 2010 Mapping the Mal Web Report

  • Cybercriminals are opportunistic: Domain registrars set the guidelines for anyone who wants to register a site. As rules evolve each year, cybercriminals sniff out loopholes and create new ways to set up dangerous sites quickly.
  • A clean domain deters cybercriminals: Cybercriminals move away from domains that have tougher restrictions. This year, Singapore (.SG) showed significant improvement.
  • Safest domains: .TRAVEL and .EDU are the safest top-level domains with less than .05 percent of sites infected, which is one in 2,000 sites.

Tips for Consumers, Businesses and Domain Operators

“What online surfers may not know is that simply viewing a page can return much more than they bargained for,” said Greve. “Cybercriminals lay invisible traps all over the Internet that are intended to steal consumers’ passwords, bank information or even identities.”

Web surfers can stay protected from quickly evolving threats on the Web by using reputable, actively updated security software with advanced malware detection and prevention. Security suites like McAfee Total Protection™ keep users’ personal information and computers safe with several tools and technologies to protect against every facet of online risks.

Businesses can help users navigate Web risks by adding Web reputation functionality to their other defenses. Operators of risky TLDs can learn from the report as well. It is possible to turn around a risky reputation or maintain a good one. For more information or to download the full report, please visit http://us.mcafee.com/en-us/local/docs/Mapping_Mal_Web.pdf

About the Mapping the Mal Web Report

McAfee used the McAfee® Global Threat Intelligence database to analyze content, behavior and reputation to determine riskiness in the Mapping the Mal Web report. The database correlates multiple types of threat data from more than 150 million sensors located in more than 120 countries. These sensors—individual computers, gateway network devices, endpoint software, in-the-cloud hosted services—come from consumers, small- and mid-sized businesses, enterprise customers, educational institutions and governmental agencies.

About McAfee, Inc.

McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely. Backed by unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee secures your digital world. http://www.mcafee.com

Note: McAfee, the McAfee logo, Global Threat Intelligence, McAfee Labs and McAfee Total Protection are registered trademarks or trademarks of McAfee, Inc., or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. ©2010 McAfee, Inc. All rights reserved. The product plans, specifications and descriptions herein are provided for information only, subject to change without notice, and without warranty of any kind, express or implied.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...