Bugs, Breaches, & More – ASW #75
Bugs, Breaches, & More
The post Bugs, Breaches, & More – ASW #75 appeared first on Security Weekly. Continue reading Bugs, Breaches, & More – ASW #75
Collaborate Disseminate
Bugs, Breaches, & More
The post Bugs, Breaches, & More – ASW #75 appeared first on Security Weekly. Continue reading Bugs, Breaches, & More – ASW #75
The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy.
This post seeks to document the extent of those attacks, and traces the origins of this overwhelmingly successful cyber espionage campaign back to a cascading series of breaches at key Internet infrastructure providers. Continue reading A Deep Dive on the Recent Widespread DNS Hijacking Attacks
The definition of domain hijacking is: “to gain (temporarily) control a domain” which could be either through:
Stealing the legal and/or technical ownership of a domain (for example by transferring the domain to another reg… Continue reading What are known domain hijacking methods?
The Extensible Provisioning Protocol (EPP) as described in RFC 5730, can possibly be protective against domain hijacked. The protocol consists of the 17 following status-values as described in RFC 5731:
clientDeleteProhibit… Continue reading Which Extensible Provisioning Protocol (EPP) status-values provide sufficient protection against domain hijacking?
Domain name registrars offer whois ID protection services. I do plan to use such a service.
But as I’m a relative newbie to the domain name registration world, I don’t know whether I can trust it.
I’m trying to decide w… Continue reading How much can I trust domain registrars to honor Whois identity protection services?