Language Selection

English French German Italian Portuguese Spanish

DNS attacks on the up

Filed under

Domain name system (DNS) poisoning attacks affect enterprise servers and cause users to be directed to malicious websites when they try to access legitimate ones.

The exploit this by directing the user to a different web IP address even though the correct domain has been typed in by the user.

Once the user is directed to a malicious site they could unwittingly download malware onto their machine and the corporate network, which could include viruses, adware, spyware or key-logging programs that can be remotely controlled by hackers.

The ISC says such attacks are spreading partly as a result of the default settings on older Windows-based servers.

Servers running NT 4.0 or versions of Windows 2000 prior to Service Pack 3 are particularly vulnerable as they don’t automatically protect companies against DNS Poisoning.

Symantec recently had to release a security patch to stop its older security appliances from letting such attacks through.


More in Tux Machines

GNOME 3.20 Desktop Environment Gets Closer with the Latest Development Milestone

After a couple of weeks of hard work, and with a two-day delay, the second development milestone of the upcoming GNOME 3.20 desktop environment is finally here, available for testing on various GNU/Linux operating systems. Read more

Wine Announcement

The Wine development release 1.8-rc2 is now available. What's new in this release (see below for details): - Bug fixes only, we are in code freeze. The source is available from the following locations: Binary packages for various distributions will be available from: Read more

GNOME 3.19.2 released

Hi! The second snapshot of GNOME 3.19 is now available, it incorporates updates from 3.18.2 as well as quite a serie of edgier modules. To compile GNOME 3.19.2, you can use the jhbuild [1] modulesets [2] (which use the exact tarball versions from the official release). [1] [2] Read more