Major DNS Cache Poisoning Attack Hits Brazilian ISPs

Discussion in 'other security issues & news' started by MrBrian, Nov 7, 2011.

Thread Status:
Not open for further replies.
  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  2. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,148
    Easiest mitigation - don't live in Brasil.

    That's pretty nuts though.
     
  3. funkydude

    funkydude Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    6,851
    You're kidding, right? The easiest mitigation is not using your ISP's DNS servers, but a better alternative such as NortonDNS or OpenDNS.

    Though, that won't help against this:
    Which could be caused by a number of things including holes in the router OS, weak passwords, or even allowing remote management.
     
  4. wat0114

    wat0114 Guest

    Forced how? By gunpoint? Threats against family members? :rolleyes:

    Nothing more than social engineering. The easiest solution, it would seem, is don't click on the applet!

    Whoaa! this seems frightening...tough to defend against this kind of ruse :rolleyes:
     
  5. hogndog

    hogndog Registered Member

    Joined:
    Jun 9, 2007
    Posts:
    628
    Location:
    In His Service
    Think I'll saddle up and go over yonder to the Comodo forums and see how their secure DNS is holding up..:shifty:

    Hogndog

    I'm counting on their brand of firewall secure DNS with Defense + ;)
     
  6. hogndog

    hogndog Registered Member

    Joined:
    Jun 9, 2007
    Posts:
    628
    Location:
    In His Service
  7. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    You'd be surprised. :argh:
     
  8. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    This may be related [thread]311999[/thread]
     
Loading...
Thread Status:
Not open for further replies.