Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

DNS Security Overhaul Spells Doom For Cyber Attackers

Symantec : 15 July, 2010  (Technical Article)
Symantec comments on the latest overhaul to the Domain Name System which makes it more difficult for cyber attackers to redirect browsers to fake websites
The Domain Name System which serves as the 'phone book' for the Internet by translating human-friendly computer hostnames into IP addresses is undergoing a security overhaul to address some of its flaws which allow hackers to redirect users to fake websites (which then infect their computers with malware) without their knowledge.

The next stage of this occurs today when the Domain Name System Security Extensions (DNSSEC) protocol public key is added to the 'root' name servers. Some commentators have suggested this date marks a 'Black Thursday' for cyber attackers.

Kevin Hogan, Sr Director at Symantec Security Response has been assessing this and has made the following comments:

"The implementation of DNSSEC has been a long time in coming and each milestone passed is a very necessary step in the right direction. The signing of responses from the 13 root zone server clusters on July 15 should be seen in that context—it's a start and a very big start. However, any expectation that this milestone marks the date that the Internet suddenly becomes safe is exaggerated.

"To be effective, DNSSEC needs to be implemented down the whole DNS chain, from the root down to your ISP or company, so there are still many more milestones to be achieved before DNSSEC can achieve some of its promise, even if cyber criminals don't identify ways around the signed response safeguard."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo