Friday, August 8, 2008

SafeCentral Protects Users from Massive DNS Flaw

In the old days when you made a phone call, your request was routed to an operator who correlated the person you wanted to reach against the circuit they were on, and physically connected the cables to enable your conversation. Despite the wonders of the internet, things still work pretty much the same way. When you make a request to visit "www.paypal.com", that request is interpreted and translated by a DNS (Domain Name Server) that matches "www.paypal.com" with the IP address of the web server before sending you on your way.

One common method for hackers to steal identities, money, and more is to 'poison' or hijack DNS servers and DNS requests, and to have your traffic re-routed to sites that look like the real thing, but exists solely to steal your account credentials. So, when you type "www.paypal.com" into your browser, it's possible that a bad-guy could intercept that request and send you to his web server, which offers up a page that looks IDENTICAL to the real PayPal site. After capturing your login credentials, these hackers are usually kind enough to forward you on to the real site, so you never know the difference - UNTIL YOUR MONEY IS GONE.

In a presentation at the Black Hat security conference, Dan Kaminsky highlighted a massive flaw he'd discovered which affects millions of DNS servers across the internet. This flaw makes these servers vulnerable to these hacker attacks, and puts every web user at risk. Preventing DNS attacks was part of the central premise of the SafeCentral solution, and we're happy to report that our SecureDNS technology (built into SafeCentral) provides an effective defense against these attacks. Read the press release for more detail, and visit Dan Kaminsky's blog for full details and to test if your DNS connections are open to this kind of attack.

No comments: