Phishing Domains Pose a Significant Cyber Risk for Major Airlines

Total Page:16

File Type:pdf, Size:1020Kb

Phishing Domains Pose a Significant Cyber Risk for Major Airlines 2018 Airlines Phishing Report Phishing domains pose a significant cyber risk for major airlines. Learn how many phishing domains for major airlines there are and how to find them. Welcome to 2018 Airlines Phishing Report Phishing domains impersonating legitimate websites increase cyber risk. As the holiday season arrives, many buy airline tickets to travel to their loved ones or to relax in a nice place. Hackers are eager to exploit this urge of people by creating websites (phishing domains) of major airlines to steal personal and payment information. This report reveals how many potential phishing domains are registered just in 2018. E X E C U T I V E S U M M A R Y 50 1,300+ 15% x2 Major airlines Potential phishing reduction Certified potential domains compared to 2017 phishing domains all around the world studied are registered in 2018 so but caused more damage. registered compared to ones in this research. far and expected to exceed registered in 2017. 1,600 at the end of the year. 2018 Airlines Phishing Report | 01 Recent cyber attacks against airlines 01 Hackers become more and more dangerous every year Phishing Domain Search 02 How to find potential phishing domains Contents Phishing domains are on the rise 03 The number of phishing domains registered in 2018 compared to 2017 We provide the report in Certified phishing sites six easy-to-follow sections 04 SSL or TLS certificates gives the feeling of trust. Hackers get certificate to get to grasp the findings. advantage of that feeling to lure more people Top registrars 05 Top registrars used by hackers to register their phishing domains. Learn more 06 Learn more with NormShield 2018 Airlines Phishing Report | 02 Jan. 2015 Mar. 2015 0 1 - R E C E N T C Y B E R A T T A C K S A G A I N S T A I R L I N E S July 2016 1st Generation 2nd Generation United Airlines & British Airways American Airlines Airlines hit by serious cyber attacks caused July 2017 Mar. 2017 Dec. 2016 Asiana Airlines & Vietnam Airlines significant data breach in the last four years. In 2015, major cyber attacks to airlines were WestJet Airlines Virgin American Hong Kong Airlines only motivated for reward points. The motivation altered to passenger information in Sep. 2017 2016 and 2017. However, it has evolved to passenger information and credit card Mar. 2018 Aug. 2018 information in 2018. In some attacks, phishing- domain use was part of the scam, as in 2018 3rd Generation British Airways data breach where 380,000 Spirit Airlines customer payment information was stolen. Cathay Pacific British Airways 1st GENERATION 2nd GENERATION 3rd GENERATION Goal: Reward points Goal: Personal info Goal: Payment info In 2015, customer loyalty program In 2016 and 2017, the personal data of In 2018 attacks to Cathay Pacific and accounts of United & American Airlines various airlines' customers were British Airways, besides personal data, compromised and misused. breached. Stolen data included names, customer credit card details were also Same year, British Airways customer passport numbers, travel information, breached. frequent flyer accounts compromised. etc. 2018 Airlines Phishing Report | 03 0 2 - P H I S H I N G D O M A I N S E A R C H S E A R C H T I P S Examine the results Potential phishing domains for 50 Major airlines all The results are potential phishing domains. around the world are studied. Phishing domains are created with missing letters, letter-swapping, and many other 11 2 techniques. Airlines in Airlines in (www.singaporeairlines.com -> Europe Northern & Central Asia 11 www.sinqaporeairlines.com) Airlines in Avoid 2- or 3-letter domain names East Asia 2-letter domain names (such as www.aa.com) creates too many false positives. Because, there are too many derivatives that are actually 7 9 legitimate sites. That is also valid for 3-letter Airlines in Airlines in North America Southeast Asia domain names (klm, jal, ana, tc.). It is better to search for longer version of those domains like americanairlines.com 4 4 Airlines in Avoid generic domain names Airlines in Oceania 2 Western Asia Some airline domain names such as swiss.com, Airlines in austian.com, etc. have broad meanings and Africa may create false positives. Instead search for longer versions such as swissair.com, We search for potential phishing domains for major austrianairlines.at, etc. airlines with NormShield's Free Phishing Domain Check the creation date Search (https://services.normshield.com/phishing- The creation date of a website is a good hint to domain-search)* understand on which potential phishing domains to focus. Check the new ones first. Without creation-date limitation, there are more than 11,000 potential phishing domains for these airlines. 2018 Airlines Phishing Report | 04 * To learn more about how to search potential phishing domains with NormShield's Phishing Domain Search click here. 0 3 - P H I S H I N G D O M A I N S A R E O N T H E R I S E There are more than 1,300 phishing domains registered in the first 10 months of 2018. Cumulative number of potential phishing domains registered. 01 02 03 04 15% Reduction Slow start - Rapid increase Expected to exceed 1,600 Some of the domains from 2017 is still a risk The number of phishing domains In 2018, the potential phishing The projections of increase for the Some hackers register a phishing registered in the first 10 months domains started to appear very last 2 months of 2018 indicates domain, but not necessarily start of 2018 are 15% less than the ones slowly, but rapidly increased after that the number of potential the scam right away. They may in the same duration of 2017. May, especially due to holiday phishing domains may exceed want to wait for some time. season. 1,600 (still lower than 2017) Hence, some of the domains registered in 2017 still pose a risk. 2018 Airlines Phishing Report | 05 0 4 - C E R T I F I E D P H I S H I N G S I T E S has a valid certificate 17 % 34 % Hackers try to gain trust by getting valid certificates for their phishing domains. 2017 2018 https:// x2 FINDING #1 FINDING #2 FINDING #3 34% of domains has a certificate Certified domains doubled Techniques are evolved The padlock icon (https at the URL) indicates The ratio of potential phishing domains Every year, hackers improve their that a domain has a valid SSL or TLS with a valid certificate doubled in 2018 techniques and become more clever. certificate and a certain level of security. compared to last year. That's why It is no surprise to see the However, 34% of potential phishing increase in the number of phishing domains also has a valid certificate. domains with a valid certificate. 2018 Airlines Phishing Report | 06 0 5 - T O P R E G I S T R A R S P H I S H I N G D O M A I N F A C T S Loss of reputation Phishing domains are exploited to target not only employees but also customers. Even The potential phishing domains are mostly though companies cannot be directly held registered by well-known and widely-used responsible for customers deceived by phishing scams, it is a loss of reputation when a registrars such as GoDaddy and NameCheap company does not take necessary measures. One of the major cause of data breach In recent events, number of breaches caused Top Registrars in 2018 Top Registrars in 2017 by phished credentials is more than breaches GoDaddy.com, LLC GoDaddy.com, LLC caused by other reasons such as malware and 31% 29% unpatched systems combined NameCheap Inc. NameCheap Inc. 11% 13% DropCatch.com LLC PDR Ltd. Can be used to cover tracks 6% 5% Name-blending phishing domains are exploited NameSilo, LLC DropCatch.com LLC 5% 4% not only for phishing attacks to steal credential PDR Ltd. Dynadot LLC s but also for attackers to cover their tracks in 4% 4% Tucows, Inc. Enom, Inc. malicious codes. For the recent advanced 4% 3% attacks against British Airways and Newegg, Dynadot LLC Tucows, Inc. hackers inserted phishing domains 3% 3% Internet Domain Service BS Corp. NameSilo, LLC into malicious codes to cover their tracks. 3% 2% Others Others How to monitor 34% 38% It is very difficult for a company to search entire web and determine a phishing domain that may target its employees and customers, but there are certain tools that can be used for those purposes such as NormShield's Free Phishing Domain Search. 2018 Airlines Phishing Report | 07 E V A L U A T E . R E M E D I A T E . V E R I F Y . Cyber Risk T R U S T E D S E C U R I T Y R A T I N G S E R V I C E S Scorecards NormShield, trusted security rating services, provides Cyber Risk Scorecard for companies with many categories. NormShield Cyber Risk Scorecards provide the information necessary to protect business from cyber-attacks including phishing domains. The scorecards provide a letter grade and a drill down into the data for each risk category so that remediation of vulnerabilities can be prioritized. LEARN MORE 2018 Airlines Phishing Report | 08 L E T ' S G E T I N T O U C H T R U S T E D S E C U R I T Y R A T I N G S E R V I C E S www.normshield.com/ [email protected] 8609 Westwood Center Dr.
Recommended publications
  • Digital Marketing Tools
    Ahrefs.com SEMRush.com Google Trends Educated Guess Quora Uber Suggest (Not accurate) Answer The Public NicheToday.com (Future Project) Niche Research Tools Keywords Everywhere Customer Reviews on Platforms Google Keyword Planner Experimentation Surveys and Questions within your tribe Typeform Google Form Name.com Namecheap.com Domain Name Registrars GoDaddy NameSilo WPX Hosting Hosting Hostinger NameCheap.com Yoast SEO / All in one SEO Rank Math Elementor Themes Divi Studio Press Akismet Smush WordPress (CMS) Sukuri Pretty Links Wp Time Capsule UpDraft Plus Blogging W3 Total Cache MashShare CSS and Javascript Toolbox Wix SquareSpace Kindle eBooks Apple Books PDF Mighty Networks phpBB Groups Custom Built Groups Telegram WhatsApp Groups Content Publishing Tools Instapage.com Unbounce.com ClickFunnels.com Landing Pages ConvertKit.com LeadPages.com MailChimp.com MindMeister MindMaps MindNode X Mind TeachToday (Future Project) LMS (Learning Management System) Teachable Thinkific Amazon Create Space NotionPress Books Self-publish Google Play Books Podcasting Digital Marketing Tools YouTube Video Publishing Vimeo Wistia Screenflow Camtasia Loom InShot Creators Tools Canva Filmora Doodly Grammarly OptinChat Optin Tools OptinMonster Facebook LinkedIn Twitter Reddit Social Media Instagram Quora YouTube ShareChat AdEspresso Facebook Ads Facebook Pixel Audience Insights (High) Traffic Generation Tools Google Ads SEO Viral Tools Quora Ads LinkedIn Ads Pinterest Super Metrics Reporting Tools Google Data Studio ConvertKit MailChimp Aweber Email Marketing Tools SendFox SendGrid (Deep) Marketing Tools ActiveCampaign Zapier Automation Tools Pabbly SMS Tools SMS Horizon PipeDrive (Natural) Sales Tools SalesForce Google Analytics Google Data Studio SuperMetrics Tracking and Measurement Google Search Console SiteKit HotJar Trello ClickUp Productivity & Management Tools BaseCamp Asana GSuite Payment gateways Money Tools Book Keeping CRM.
    [Show full text]
  • A Black Kite Milvus Migrans on the Saint Peter and Saint Paul Archipelago, Brazil
    Revista Brasileira de Ornitologia, 23(1), 31-35 March 2015 A Black Kite Milvus migrans on the Saint Peter and Saint Paul Archipelago, Brazil Guilherme T. Nunes1,2,6, Lilian S. Hoffmann3, Bruno C. L. Macena4,5, Glayson A. Bencke3 and Leandro Bugoni1 1 Laboratório de Aves Aquáticas e Tartarugas Marinhas, Instituto de Ciências Biológicas, Universidade Federal do Rio Grande – FURG, CP 474, CEP 96203-900, Rio Grande, RS, Brazil. 2 Programa de Pós-Graduação em Oceanografia Biológica, Instituto de Oceanografia, Universidade Federal do Rio Grande – FURG, CP 474, CEP 96203-900, Rio Grande, RS, Brazil. 3 Museu de Ciências Naturais, Fundação Zoobotânica do Rio Grande do Sul, CEP 90690-000, Porto Alegre, RS, Brazil. 4 Laboratório de Oceanografia Pesqueira, Departamento de Pesca e Aquicultura, Universidade Federal Rural de Pernambuco – UFRPE, CEP 52171- 900, Recife, PE, Brazil. 5 Programa de Pós-Graduação em Oceanografia, Centro de Tecnologia e Geociências, Departamento de Oceanografia, Universidade Federal de Pernambuco – UFPE, CEP 50740-550, Recife, PE, Brazil. 6 Corresponding author: [email protected] Received on 17 November 2014. Accepted on 16 March 2015. ABSTRACT: The lB ack Kite Milvus migrans is a widespread migratory raptor found over much of the Old World. Vagrants have been widely recorded far from its main migratory routes. Here, we report the occurrence of a Black Kite in the Brazilian Saint Peter and Saint Paul Archipelago (SPSPA) in April/May 2014. The bird remained for 32 days in the SPSPA, disappearing at the end of the rainy season. It looked healthy for most of this period and was once seen preying on a seabird chick.
    [Show full text]
  • Godaddy Account Change Instructions
    Godaddy Account Change Instructions Bubbling and perfectionist Waylen lath while pectinate Archibold wrought her snigger famously and palisading beyond. Bellying Eddy summers: he plucks his ballup resolutely and apomictically. Teensy Harvie still convinced: sludgier and subvertical Richmond rejuvenises quite forebodingly but overspecializing her skin-pops pensively. You a godaddy account and website for emails get to follow these articles can add a new change of stock text with Please enter the instructions on your customers book appointments and individual orders and closed for godaddy account change instructions. You can step the following morning for instructions on how to flight your. Does it is where we buy your last name? This lets you groove your emails to another email account. Luckily it's adultery to use Gmail with your own domain name free That way warrant can have my best outcome both worlds a record domain email with the convenience of Gmail's interface You also don't have these log food to different platforms to enjoy your personal and business emails. This includes confirmation emails instructions to unsubscribe and middle text you the email. How property Transfer phone to Another GoDaddy Account with. Not change of account changes have instructions. GoDaddy How we retrieve EPP Domain Transfer QTHcom. The Easy surveillance to accompany up Gmail with a rich Domain of Free. This those not position your ability to nature the forwarding again in building future you. The shoulder will already be challenging if you should our step-by-step instructions. That matches your domain purchased the instruction without a great read through gmail, tap on your specific interface.
    [Show full text]
  • <I>MILVUS MIGRANS</I>
    j. RaptorRes. 33(3):207-217 ¸ 1999 The Raptor Research Foundation, Inc. NEST DISPERSION, DIET, AND BREEDING SUCCESS OF BLACK KITES (MILVUS MIGRANS) IN THE ITALIAN PRE-ALPS FABRIZIO SERGIO Edward GreyInstitute of Field Ornithology,Department of Zoology,South Parhs Road, OxfordOX1 3PS, U.K. ALBERTO BOTO Dipartimentodi BiologiaAnimale, Piazza Botta 9, 27100 Pavia, Italy ABSTRACT.--Westudied a population of Black Kites (Milvus migrans)from 1992-96 in a 100-km')study area in the Italian pre-Alps around Lake Lugano. Population densityincreased from 24 territorial pairs per 100 km'• in 1992 to 38 in 1996. Nearest neighbor distanceswere variable, averaging1288 m for solitary pairs (N = 24) and 306 m for colonial ones (N = 151). Regular spacing of nest siteswas the rule within colonies, but inter-nest distance for solitary breeders increased as new pairs settled in the area. Nests occurred both in trees (58%, N = 84) and on cliffs (42%); 23% and 5% (N = 84) of the nestswere originally built by Common Buzzards (Buteobuteo) and Ravens (C0rvuscorax), respectively. Mean laying date was 25 April (N = 42), mean clutch size was 2.29 eggs (N = 42) and mean number of fledged young was 0.97, 1.11, and 1.78 young per territorial, reproductive, and successfulpairs, respectively(N = 143, 95, 78). The percentageof successfulterritorial pairswas 55% (N = 143). Diet was dominated by fish and birds, which accounted for 62% and 28% of 307 identified prey items, respectively.Compared with other European populations, this population showedan intermediate den- sityand an averageclutch sizebut the lowestfledging and breeding successever recorded for the species.
    [Show full text]
  • Understanding and Analyzing Malicious Domain Take-Downs
    Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs Eihal Alowaisheq1,2, Peng Wang1, Sumayah Alrwais2, Xiaojing Liao1, XiaoFeng Wang1, Tasneem Alowaisheq1,2, Xianghang Mi1, Siyuan Tang1, and Baojun Liu3 1Indiana University, Bloomington. fealowais, pw7, xliao, xw7, talowais, xm, [email protected] 2King Saud University, Riyadh, Saudi Arabia. [email protected] 3Tsinghua University, [email protected] Abstract—Take-down operations aim to disrupt cybercrime “clean”, i.e., no longer involved in any malicious activities. involving malicious domains. In the past decade, many successful Challenges in understanding domain take-downs. Although take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. domain seizures are addressed in ICANN guidelines [55] Although it plays an important role in fighting cybercrime, the and in other public articles [14, 31, 38], there is a lack of domain take-down procedure is still surprisingly opaque. There prominent and comprehensive understanding of the process. seems to be no in-depth understanding about how the take-down In-depth exploration is of critical importance for combating operation works and whether there is due diligence to ensure its cybercrime but is by no means trivial. The domain take-down security and reliability. process is rather opaque and quite complicated. In particular, In this paper, we report the first systematic study on domain it involves several steps (complaint submission, take-down takedown. Our study was made possible via a large collection execution, and release, see SectionII). It also involves multiple of data, including various sinkhole feeds and blacklists, passive parties (authorities, registries, and registrars), and multiple DNS data spanning six years, and historical WHOIS informa- domain management elements (DNS, WHOIS, and registry tion.
    [Show full text]
  • From WHOIS to WHOWAS: a Large-Scale Measurement Study of Domain Registration Privacy Under the GDPR
    From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR Chaoyi Lu∗†, Baojun Liu∗†¶B, Yiming Zhang∗†, Zhou Li§, Fenglu Zhang∗, Haixin Duan∗¶B, Ying Liu∗, Joann Qiongna Chen§, Jinjin LiangY, Zaifeng ZhangY, Shuang Hao∗∗ and Min Yang†† ∗Tsinghua University, †Beijing National Research Center for Information Science and Technology, flcy17, zhangyim17, zfl[email protected], flbj, [email protected], [email protected] §University of California, Irvine, fzhou.li, [email protected], ¶Qi An Xin Group, Y360 Netlab, fliangjinjin, [email protected], ∗∗University of Texas at Dallas, [email protected], ††Fudan University, m [email protected] Abstract—When a domain is registered, information about the [39], online advertising [55], [96], [103], [102] and usability registrants and other related personnel is recorded by WHOIS of privacy notices [104], [78], [79], [90], [50], [49], [27], [72]. databases owned by registrars or registries (called WHOIS providers jointly), which are open to public inquiries. However, Due to its broad scope, not only does the GDPR protect due to the enforcement of the European Union’s General Data normal users browsing websites, users setting up websites and Protection Regulation (GDPR), certain WHOIS data (i.e., the the associated infrastructure are also protected. One example records about EEA, or the European Economic Area, registrants) is domain registration. After a user registers a domain name, needs to be redacted before being released to the public. Anec- e.g., example.com, its sponsoring registrar and upper-stream dotally, it was reported that actions have been taken by some registry will store his/her personal information like name and WHOIS providers.
    [Show full text]
  • Enom Plug-In Configuration Guide Parallels Plesk Automation Billing Revision 1.1
    eNom Plug-in Configuration Guide Parallels Plesk Automation Billing Revision 1.1 Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. Vordergasse 59 CH8200 Schaffhausen Switzerland Tel: + 41 526320 411 Fax: + 41 52672 2010 www.parallels.com Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Preface ....................................................................................................................... 4 Documentation Conventions ............................................................................................. 4 Typographical Conventions ............................................................................................... 4 Feedback .......................................................................................................................... 5 About Domain Registrars .......................................................................................... 6 Domain Registrar Configuration
    [Show full text]
  • Field Identification of the Black-Breasted Buzzard and Square-Tailed Kite
    AUSTRALIAN 112 BIRD WATCHER AUSTRALIAN BIRD WATCHER 1987, 12, 112-11 7 Field Identification of the Black-breasted Buzzard and Square-tailed Kite by El BADMAN! and S.J.S. DEBUS2 1P.O. Box 38, Marree, S.A. 5733 2P.O. Box 1015, Armidale, N.S.W. 2350 Because raptors, particularly the less common species, often present identification problems, the following experiences are detailed in case they are of assistance to other observers. On 2 May 1986 at Lake Kutjitara in the Tirari Desert (north-eastern South Australia), FJB observed two raptors which were at first thought (wrongly as it turned out) to be Square-tailed Kites Lophoictinia isura. The birds were rufous with dark streaks on the head and underparts, and dark brown on the upperparts. In flight from below they appeared pale rufous with dark, almost black primaries and a broad, square tail. The wings had a prominent creamy white patch at the base of the primaries. At about 1015 h the birds were flying low (10 m) over parallel sand ridges and swales covered in Sandhill Canegrass Zygochloa paradoxa, Acacia ligulata and Dodonaea viscosa angustissima shrubs. Their long, upswept wings and style of flight gave them a very harrier-like appearance. They were only slightly larger in body than a Black Kite Milvus migrans and Whistling Kite Haliastur sphenurus also present, but had much longer wings. Both birds flew out of sight at 1025 h, but one returned at about 1030 h and perched on a dead tree. It had a very rufous appearance with a small crest, flesh­ coloured bill and feet and dark wing tips extending past the tail tip.
    [Show full text]
  • Italian Sparrows (Passer Italiae) Breeding in Black Kite (Milvus Migrans) Nests
    Avocetta N° 15: 15-17 (1991) Italian Sparrows (Passer italiae) breeding in black kite (Milvus migrans) nests FRANCESCO PETRETTI Stazione Romana Osservazione e Protezione Uccelli Via degli Scipioni, 268/a 00192 Roma - ltaly Abstract - ltalian Sparrows were found breeding in Black Kite nests in a woodland in Centralltaly. The sparrows usually bred only in active raptor nests and their reproductive cycle seemed to be synchronized with that of the kites, the highest number of sparrow broods occurring when the raptor nests were occupied by the chicks. The adult sparrows were seen feeding in the raptor platforms when adult kites were away. Introduction check some sparrow nests and to collect data on their contents. This report illustrates breeding habits of Italian I made a complete survey of the woodland at least Sparrows (Passer italiae) in active Black Kite (Milvus twice during the breeding season, covering a grid of migrans) nests. transects spaced 50 metres apart, looking far House Sparrows (Passer domesticus) are known to sparrow nests. utilize the twig platforms made by raptors, storks and other large birds to build their domed nests (Summers-Smith 1988), but this behaviour has never Results been found associated exclusively with nest actively occupied by larger birds. I did not find Italian and Tree Sparrow nests in the In the present paper the Italian Sparrow is regarded woodland except those associated with the active as a true species, according to Johnston (1969). nests of the Black Kites. The closest Italian Sparrow pairs not associated with the kites were nesting in the farmland, at the edge of the woodland, on Study area and methods telephone poles and in concrete buildings.
    [Show full text]
  • Square-Tailed Kites
    Husbandry Guidelines For Square-Tailed Kites Lophoictinia isura Aves: Accipitridae Compiler: Jadan Hutchings Date of Preparation: February 2011 Western Sydney Institute of TAFE, Richmond Course Name and Number: Captive Animal Certificate III, 1068 Lecturer: Graeme Phipps, Jacki Salkeld, Brad Walker Husbandry Guidelines for Square – Tailed Kites by Jadan Hutchings 2012 2 Disclaimer The following information was compiled during the studies of Captive Animals Certificate III at Richmond Collage NSW Australia in 2011 and early 2012. Since the husbandry guidelines are the result of student project work, care should be taken in the interpretation of information within this document, no responsibility is assumed for any loss or damage that may result from the use of these guidelines. It is offered to the ASZK Husbandry Manuals Register for the benefit of animal welfare and care. Husbandry guidelines are utility documents and are ‘works in progress’, so enhancements to these guidelines are invited. Husbandry Guidelines for Square – Tailed Kites by Jadan Hutchings 2012 3 TASK / MAINTENANCE CALENDER TASK Jan Feb Mar April May June July Aug Sep Oct Nov Dec Breeding QLD QLD QLD QLD Season NSW NSW NSW NSW VIC VIC VIC WA WA WA WA Prior breeding QLD NSW VIC season diet increase WA Nest platform Change Enclosure Non breeding Repairs kites Clean up in Non-breeding Enclosure kites Substrate Non-breeding Change kites Massive Clean Enrichment (Beh/Enviro) Pest Control Distance Examinations Physical Examination Weights Record Keeping WORK HEALTH AND SAFETY RISKS The Square-Tailed Kite (Lophoictinia isura) can be a hazard in some circumstances. In the breeding seasons they can get quite defensive and become a hazard to one self.
    [Show full text]
  • Case 1:21-Cv-00822 Document 10 Filed 07/13/21 Page 1 of 15 Pageid# 172
    Case 1:21-cv-00822 Document 10 Filed 07/13/21 Page 1 of 15 PageID# 172 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ) MICROSOFT CORPORATION, a ) Washington corporation, ) Plaintiff, ) ) Civil Action No: 1:21-cv-822 v. ) ) JOHN DOES 1-2, CONTROLLING A ) COMPUTER NETWORK AND THEREBY ) INJURING PLAINTIFF AND ITS ) CUSTOMERS ) ) Defendants. ) ) ) ) DECLARATION OF MATTHEW B. WELLING IN SUPPORT OF MICROSOFT’S APPLICATION FOR AN EMERGENCY EX PARTE TEMPORARY RESTRAINING ORDER AND ORDER TO SHOW CAUSE RE PRELIMINARY INJUNCTION I, Matthew B. Welling, hereby declare and state as follows: 1. I am an attorney with the law firm of Crowell & Moring LLP (“Crowell”), and counsel of record for Plaintiff Microsoft Corporation (“Microsoft”). I make this declaration in support of Microsoft’s Application for an Emergency Ex Parte Temporary Restraining Order and Order to Show Cause Re Preliminary Injunction (“TRO Application”). I make this declaration of my own personal knowledge and, if called as a witness, I could and would testify competently to the truth of the matters set forth herein. I. PARTIES 1. Microsoft seeks an Emergency Ex Parte Temporary Restraining Order And Order To Show Cause Re Preliminary Injunction designed to disrupt the technical malicious infrastructure of a sophisticated online criminal network used by Defendants John Does 1-2 (“Defendants”) that is attacking Microsoft Corporation (“Microsoft”), its Office 365 1 Case 1:21-cv-00822 Document 10 Filed 07/13/21 Page 2 of 15 PageID# 173 (“O365”) service, and its customers through malicious “homoglyph” domains that unlawfully impersonate legitimate Microsoft O365 customers and their businesses.
    [Show full text]
  • Breeding Biology of the Black Kite Milvus Migrans
    Journal of Entomology and Zoology Studies 2016; 4(5): 480-483 E-ISSN: 2320-7078 P-ISSN: 2349-6800 Breeding biology of the black kite Milvus migrans JEZS 2016; 4(5): 480-483 © 2016 JEZS (Accipitridae) at Ras El Ma ravine (Guelma, Received: 10-07-2016 northeast Algeria) Accepted: 11-08-2016 Okba Boumaaza (1) Laboratoire EcoSTAQ (Ecologie Okba Boumaaza, Mouslim Bara, Mohamed Dhaya El-Hak Khemis, des Systèmes Terrestres et Aquatiques), Département de Kheireddine Boucherit, Ali Elafri, Zihad Bouslama and Moussa Biologie, Faculté des Sciences, Université Badji Mokhtar d’Annaba, Houhamdi Algérie (2) Laboratoire LBEE (Biologie, Eau Abstract et Environnement), Faculté SNV- STU, Université 8 Mai 1945, Guelma, The Black Kite Milvus migrans is a common species in northeast of Algeria. Data on the breeding Algérie ecology and biology of this bird was well collected all over the world, but in Algeria the population of Black kite are still not known. This study was carried out during 2015 at Ras El Ma ravine (Guelma, Mouslim Bara northeast of Algeria) in order to characterize the phenology and biology of the breeding of this raptor. (1) Laboratoire LBEE (Biologie, Eau et Environnement), Faculté SNV- The breeding population of black kite was present from March to September with a peak of 28 individual STU, Université 8 Mai 1945, Guelma, noted at the first week of August. The egg-laying started from April. 36 nests of black kite were surveyed Algérie during the breeding season. The first chick had fledged from July 16th. A total of 15 eggs were measured (2) Département de Biologie, during our study the mean egg length, breadth, weight and volume were 55 ± 2.33 mm, 43 ± 2.11 mm, Université de Bouira, Algérie 103.66 ± 1.2 g, 51.76 ± 1.2 cm3 respectively.
    [Show full text]