DNS protection not good enough, says researcher
Dan Kaminsky, the security researcher who first unveiled the DNS vulnerability, has said that systems administrators are not enough to protect users.
Systems administrators are not doing enough to protect against a gaping DNS vulnerability, Dan Kaminsky has warned.
Kaminsky, the security researcher who first unveiled the security flaw earlier this month, explained that 86 per cent of computers were vulnerable on the day of release, but that just over half (52 per cent) had still to protect against the problem by installing software updates.
"Not perfect; not even good enough," said Kaminsky, speaking in a webinar prior to the Black Hat security conference, although he would "take 52 any day of week and twice on Sunday."
Kaminsky discovered the flaw six months before its release, but had kept details quiet while an unprecedented effort involving Microsoft, Sun and Cisco was underway to develop fixes.
The flaw affects the DNS system, which translates web addresses into IP addresses. The flaw can poison DNS records so that users will be redirected to malicious websites, even if they typed the correct address of a legitimate website.
Previous attacks on DNS servers have been documented before, but Kaminsky's approach can speed up attacks and is therefore far more potent.
Four cyber security essentials that your board of directors wants to know
The insights to help you deliver what they needDownload now
Data: A resource much too valuable to leave unprotected
Protect your data to protect your companyDownload now
Improving cyber security for remote working
13 recommendations for security from any locationDownload now
Why CEOS should care about the move to SAP S/4HANA
And how they can accelerate business valueDownload now