DNS protection not good enough, says researcher
Dan Kaminsky, the security researcher who first unveiled the DNS vulnerability, has said that systems administrators are not enough to protect users.
Systems administrators are not doing enough to protect against a gaping DNS vulnerability, Dan Kaminsky has warned.
Kaminsky, the security researcher who first unveiled the security flaw earlier this month, explained that 86 per cent of computers were vulnerable on the day of release, but that just over half (52 per cent) had still to protect against the problem by installing software updates.
"Not perfect; not even good enough," said Kaminsky, speaking in a webinar prior to the Black Hat security conference, although he would "take 52 any day of week and twice on Sunday."
Kaminsky discovered the flaw six months before its release, but had kept details quiet while an unprecedented effort involving Microsoft, Sun and Cisco was underway to develop fixes.
The flaw affects the DNS system, which translates web addresses into IP addresses. The flaw can poison DNS records so that users will be redirected to malicious websites, even if they typed the correct address of a legitimate website.
Previous attacks on DNS servers have been documented before, but Kaminsky's approach can speed up attacks and is therefore far more potent.
Four strategies for building a hybrid workplace that works
All indications are that the future of work is hybrid, if it's not here alreadyFree webinar
The digital marketer’s guide to contextual insights and trends
How to use contextual intelligence to uncover new insights and inform strategiesFree Download
Ransomware and Microsoft 365 for business
What you need to know about reducing ransomware riskFree Download
Building a modern strategy for analytics and machine learning success
Turning into business valueFree Download