HackDig : Dig high-quality web security articles for hackers

Beware “secure DNS” scam targeting website owners and bloggers

byPaul DucklinIf you run a website or a blog, you probably use a cloud provider or a dedicated hosting company to manage your server and deliver the content to your readers, viewers and listeners.We certainly do – both Naked Security and our sister site Sophos News are hosted by WordPress VIP.That’s not a secret (nor is it meant to be), not least
Publish At:2020-06-29 11:39 | Read:75 | Comments:0 | Tags:Uncategorized DNS DNSSec phish Scam

Does Your Domain Have a Registry Lock?

If you’re running a business online, few things can be as disruptive or destructive to your brand as someone stealing your company’s domain name and doing whatever they wish with it. Even so, most major Web site owners aren’t taking full advantage of the security tools available to protect their domains from being hijacked. Here’s the
Publish At:2020-01-24 15:35 | Read:1406 | Comments:0 | Tags:Latest Warnings The Coming Storm Web Fraud 2.0 Arno Vis CSC

New attacks on Network Time Protocol can defeat HTTPS and create chaos

Serious weaknesses in the Internet's time-synchronization mechanism can be exploited to cause debilitating outages, snoop on encrypted communications, or tamper with Bitcoin transactions, computer scientists warned Wednesday.The vulnerabilities reside in the Network Time Protocol, the widely used specification computers use to ensure their internal clocks ar
Publish At:2015-10-22 00:25 | Read:3268 | Comments:0 | Tags:Risk Assessment Technology Lab DNSSEC HSTS HTTPS network tim

CloudFlare Aims to Defeat Massive DDoS Attacks with Virtual DNS

DDoS attacks have been a persistent problem for the the better part of 20 years, and as ISPs and enterprises have adjusted their defenses, attackers have adapted their tactics. One of the more effective tools in the attackers’ arsenal now is the use of botnets to generate massive numbers of DNS queries for a target site, a technique that can be quite d
Publish At:2015-03-10 16:50 | Read:3042 | Comments:0 | Tags:Critical Infrastructure Hacks Malware Web Security CloudFlar

Kaminsky: DNS Insecurity Isn’t Coincidence, it’s Consequence

CANCUN – “2015 got weird… really weird.” Those were some of the first words spoken by Dan Kaminsky in his talk today at the Kaspersky Security Analyst Summit Monday.He was referring to a few key events from the last several weeks: the Sony hack debacle, or what he called “North Korean or Teenager?”; and President Obama’s s
Publish At:2015-02-16 22:15 | Read:3272 | Comments:0 | Tags:Cryptography Security Analyst Summit Web Security Dan Kamins

Still Spamming After All These Years

A long trail of spam, dodgy domains and hijacked Internet addresses leads back to a 37-year-old junk email purveyor in San Diego who was the first alleged spammer to have been criminally prosecuted 13 years ago for blasting unsolicited commercial email. Last month, security experts at Cisco blogged about spam samples caught by the company’s SpamCop ser
Publish At:2014-11-05 17:20 | Read:4126 | Comments:0 | Tags:Breadcrumbs CAN-SPAM Act Cisco DNSSEC Mega-Spred Michael Per

Small Signs of Progress on DNSSEC

SEATTLE–DNS doesn’t have a lot of friends. It’s old, it’s kind of creaky and it has some insecurity issues.The few friends it has have tried to help it out in the last few years with the addition of DNSSEC, but that hasn’t gone so well, either. The Internet hasn’t been quick to adopt DNSSEC, for a variety of reasons, but e
Publish At:2014-09-25 20:20 | Read:2773 | Comments:0 | Tags:Critical Infrastructure Web Security Cloud Security DNSSEC W

DNSSEC, from an end-user perspective, part 1

We all know since at least 1990, that the DNS protocol is insecure. Yet DNS is still the basis of almost all Internet communication. The biggest problem with DNS is that a malicious attacker can redirect victims, where victims try to connect to e.g. safesite.com, but instead of this they connect to the attackers website. There are a lot of different ways to
Publish At:2014-08-12 19:55 | Read:3717 | Comments:0 | Tags:DNS hijack DNS spoofing DNSSEC

DNSSEC, from an end-user perspective, part 2

In our previous blog post, we have discussed some of the threats against current DNS systems, where the result was that the victim landed on a different resource/website as he/she originally supposed to visit.Since this is not a guide for DNS server operators about DNSSEC implementation, let's jump to the user side and see what you should see if you visit a
Publish At:2014-08-12 19:55 | Read:9383 | Comments:0 | Tags:dig DNSSEC security

DNSSEC, from an end-user perspective, part 3

In the first post of this DNSSEC series, I have showed the problem (DNS vulnerabilities), and in the second post the "solution". In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?The following list are the attack types from the first post, where DNSSEC can
Publish At:2014-08-12 19:55 | Read:3422 | Comments:0 | Tags:DNS hijack DNS spoofing DNSSEC


Share high-quality web security related articles with you:)