article thumbnail

Microsoft Buys Corp.com

Schneier on Security

A few months ago, Brian Krebs told the story of the domain corp.com, and how it is basically a security nightmare: At issue is a problem known as " namespace collision ," a situation where domain names intended to be used exclusively on an internal company network end up overlapping with domains that can resolve normally on the open Internet.

DNS 361
article thumbnail

Microsoft Buys Corp.com So Bad Guys Can’t

Krebs on Security

From February’s piece: At issue is a problem known as “ namespace collision ,” a situation where domain names intended to be used exclusively on an internal company network end up overlapping with domains that can resolve normally on the open Internet. Further reading: Mitigating the Risk of DNS Namespace Collisions (PDF).

DNS 322
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Name:Wreck’ is the latest collision between TCP/IP and the standards process

SC Magazine

Name:Wreck adds a second layer of complexity – a common misinterpretation of the DNS standards involving memory pointers and message compression. . If you look at DNS, the original document is from 1983 and then there are several other scattered documents that talk about other ways to prevent problems.

DNS 108
article thumbnail

CSC Research Finds Third Parties Continue to Lay Groundwork for Malicious Activity Among Thousands of COVID-Related Domains

CyberSecurity Insiders

This research is part of CSC’s latest report, “ Two Year Analysis: The Impact of COVID-19 on Internet Security and Safety. In today’s digital economy, domain name related cybercrime is exponentially rising and impacting organizations, customers, partners, and the connected internet supply chain.

article thumbnail

Why 83 Percent of Large Companies Are Vulnerable to This Basic Domain Hack

Adam Levin

Far from being jealously guarded assets with Fort Knox-level security, a new study of Forbes Global 2000 Companies suggests many domain names are imminently hackable. A whopping 97 percent failed to use DNSSEC , a domain security protocol designed to address core vulnerabilities in the foundations of the internet itself.

Hacking 130
article thumbnail

Linux Ghost Vulnerability: A GHOST in the….Linux….Wires

NopSec

Applications have access to the DNS resolver primarily through the gethostbyname*() set of functions. released on November 10, 2000. Plus most of the Internet-exposed services requires some sort of name resolution. My suggestion: cloud-based Linux Internet exposed servers should be patched immediately! and glibc-2.18).

DNS 52
article thumbnail

Dangerous Domain Corp.com Goes Up for Sale

Krebs on Security

At issue is a problem known as “ namespace collision ,” a situation where domain names intended to be used exclusively on an internal company network end up overlapping with domains that can resolve normally on the open Internet. INSTANT CORPORATE BOTNET, ANYONE? Department of Homeland Security. Control corp.com.”

DNS 333