The makers of BIND, the Internet’s most widely used software for resolving domain names, are warning of two vulnerabilities ...
A cache poisoning attack occurs when an outside hacker creates a fake message that the DNS will accept, which can trick the server into delivering an incorrect request. The error, affecting numerous ...
DNS cache poisoning occurs when an attacker hacks into a domain name server, one of the machines that translate URLs such as www.techweb.com into the appropriate IP address. The attacker then "poisons ...
ISC announced BIND 9 updates that resolve high-severity vulnerabilities in the DNS server software, including cache poisoning ...
NS1, a domain name system (DNS) and traffic management provider, is taking on “DNS cache poisoning” attacks with new DNS Security Extensions (DNSSEC) capabilities built into its platform. DNS ...
New data on the state of ISP security through 2008 suggests that companies are better equipped to deal with many common threats than they were in years past. DNS cache poisoning, and BGP hijacking, ...
Hackers have released software that exploits a recently disclosed flaw in the Domain Name System (DNS) software used to route messages between computers on the Internet. The attack code was released ...
There has been a long history of attacks on the Domain Name System ranging from brute-force denial-of-service attacks to targeted attacks requiring specialized software. In July 2008 a new DNS ...
A year has passed since security researcher Dan Kaminsky disclosed a serious flaw in the DNS that makes it possible for hackers to launch cache poisoning attacks, where traffic is redirected from a ...
The creator of the Metasploit hacking toolkit has become the victim of a cache poisoning attack that targets a DNS bug HD Moore has been owned. That’s hacker talk, meaning that Moore, the creator of ...
Note: The following post is a guest blog submitted to Microsoft Subnet by a security expert who wished to remain anonymous. Joanna Rutkowska recently released her new security whitepaper and exploit ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results