Feeds

Chinese domain crackdown targets smut sites

Individual website ownership swept away by clean up

Secure remote control for conventional and virtual desktops

Chinese regulators have started to request business licences and paperwork before allowing future .cn domain registrations.

The move by registrars at the China Internet Network Information Center (CNNIC) has been welcomed by security researchers, such as Mikko Hypponen at F-Secure (here), because it is likely to make life more difficult for malware distributors and fraudsters, many of whom have set up shop on Chinese (.cn) domains over recent months.

Domains in the PR of China rank second behind only those in Cameroon (.cm) as the most likely to harbour malware, according to a survey by McAfee published earlier this month.

However, the tightening up of domain registration processes in China isn't without its drawbacks. Local individuals have effectively been barred from registering new domains unless they have some sort of business license, Global Times of China reports. China's official media outlets, meanwhile, report the tightening up of registration regulations as a means to address flaws in the previous system that left the Chinese portion of the interweb awash with smut.

CNNIC intends to verify the identity of existing domain owners of personal sites, with failures to "submit real, accurate and complete information" resulting in site takedowns.

Three domain name registration agents in China - Zhengzhou-based unndc.com, and Beijing-based namerich.cn and xinnet.com - were suspended from offering .cn domain name registrations last Friday over allegations of slack business practices in the granting of domains. More than 10 million .cn domains exist, Global Times of China adds. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.