DNS cache poisoning on the rise

Powered by SC Magazine
 

A new threat that poisons DNS caches has been identified.

A new threat that poisons DNS caches has been identified.

David Holman, director of First Cyber Security claimed that the attack came to prominence in July when advice was issued on DNS cache poisoning where users can be tricked into inadvertently giving away personal details on the internet and receive malware infections and email problems.

Holman claimed that every internet user relies on domain name lookup tables, which translate a given domain name into the relevant numeric IP address and with the poisoning of DNS caches, lookup tables are corrupted and the numeric IP addresses of fake web pages are inserted in place of the real addresses for popular sites.

He said: “When a user types in a correct URL they are routed to the false page, instead of the real one. From then on, any details they enter such as usernames and passwords can be captured by third parties and used as part of internet fraud including identity theft.

Solving the problem is not going to be easy for the IT security industry, as conventional IT security systems and software can find it difficult to protect against the problem effectively.

The average computer user is not an IT specialist, and shouldn't need to be to use the internet safely. First Cyber Security provides consumer facing independent web site validation designed specifically to protect against this threat.”

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Images: the next frontier in data analytics?
Barclay’s global data chief says we’re still at the starting line.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 417

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 196

Vote