Bitcoin Wallet Blockchain.info Recovers from DNS Hijacking Attack

Bitcoin Wallet Blockchain.info Recovers from DNS Hijacking Attack

At the time of writing, everything is back to normal

Nation-State Actors Are Probing Core Internet Infrastructure for Failure Points

Nation-State Actors Are Probing Core Internet Infrastructure for Failure Points

Schneier suspects China and Russia are behind the attacks

Malware Finds New Trick to Hide Rogue DNS Settings on Windows

Malware Finds New Trick to Hide Rogue DNS Settings on Windows

DNS Unlocker finds a way to hide hijacked DNS servers from human operators via one "special" character

CloudFlare Launches Domain Name Registrar Focused on Security

CloudFlare Launches Domain Name Registrar Focused on Security

CloudFlare-registred domain names will never expire

UConn Website Hijacked and Used to Spread Fake Flash Player Containing Malware

UConn Website Hijacked and Used to Spread Fake Flash Player Containing Malware

University of Connecticut loses control of its DNS entries

Popular VPN Services Fail to Protect User Traffic

Popular VPN Services Fail to Protect User Traffic

14 commercial products tested, all vulnerable

Exploit Kit Delivers DNS Changer to Thousands of Routers

Exploit Kit Delivers DNS Changer to Thousands of Routers

Router list constantly updated, at least 55 models targeted

Domain Registrar eNom Informs of DNS Hijacking Attack

Domain Registrar eNom Informs of DNS Hijacking Attack

Attack was short-lived, authorities were informed within hours

St. Louis Federal Reserve Forces Password Reset Following DNS Hijacking Attack

St. Louis Federal Reserve Forces Password Reset Following DNS Hijacking Attack

Hackers set up phishing pages to collect login credentials

Lenovo.com Domain Hijacked, Possibly by Lizard Squad

Lenovo.com Domain Hijacked, Possibly by Lizard Squad

Email to company employees intercepted by the hackers

Lizard Squad Diverts Connection to Google Vietnam

Lizard Squad Diverts Connection to Google Vietnam

SSL website certificate alerts users of the trap

D-Link Routers Vulnerable to Unauthorized DNS Changing

D-Link Routers Vulnerable to Unauthorized DNS Changing

Researcher publishes exploit code for the vulnerability

$20 Micro-Controller Hijacks Computer in Seconds

$20 Micro-Controller Hijacks Computer in Seconds

Teensy micro-controller turned into USBdriveby attack device

“Hammer Time” Break Posted on Ontario.ca Website

“Hammer Time” Break Posted on Ontario.ca Website

Clearly a prank, the attack signals admins as weak spot

  • Security
  • By Lucian Constantin
  • August 1st, 2011
New Mac Trojan Hijacks Google Searches

New Mac Trojan Hijacks Google Searches

 
Want more? Browse: