DNS – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png DNS – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Here Are the 5 Biggest DNS Security Risks]]> https://www.psafe.com/en/blog/dns-security-risks/ Wed, 05 Jul 2017 19:30:08 +0000 https://www.psafe.com/en/blog/?p=12414 The DNS, or Domain Name System, is often called the Internet’s phonebook. Its servers transform domain names into IP addresses, which guide online traffic down the right pathways. Besides identifying websites, it also plays important roles in email networks, online phone services, and VPN connections. However, despite the DNS’ central role in the Internet’s functionality, it’s often poorly secured or improperly configured. Click here to check your DNS security with Wi-Fi Check:

Test your connection
Due to the Domain Name System’s faulty security and its immense importance, these servers are a popular target amongst hackers. Think of the DNS as a bullseye that everyone wants to hit. That’s why it’s important to regularly check the security of your DNS with Wi-Fi Check, so that you can ensure that your network is working as it should be. Wi-Fi Check will also check your network security, network speed, and download speed. Keep reading to find out the 5 biggest threats to DNS security in today’s online world.

Read More: How Malware Can Infect Your Wi-Fi Router

  1. Distributed Denial of Service (DDoS)

Distributed denial of service (DDoS) is arguably the most common DNS attack. During DDoS, servers are flooded with traffic by the hacker, which prevents legitimate users from accessing the network. DNS servers simply can’t withstand that volume of capacity, and they quickly cease to be accessible.

  1. DNS Tunnelling

During DNS tunnelling, the data packets that are sent and received over the DNS can become compromised. In general, this DNS process is poorly monitored by most security systems, making it a tempting target. An increase in tunnelling activity tends to mean a malware attack or data breach is in-progress.

  1. SYN Floods

Similarly to DDoS, SYN floods are another well-known Denial of Service attack. During SYN floods, the hacker transmits “fake” data packages to invented destinations. The DNS servers, however, can’t recognize that these requests are illegitimate. So, they will exhaust themselves by trying to establish an active connection, leaving them unable to attend to real requests from users.

  1. Cache Poisoning

If a DNS server is badly configured, it’s vulnerable to cache poisoning. During cache poisoning, visitors to a website arrive at an infected server, which is being governed by the hacker. Often, an online user can’t tell that they’re being phished, since the malicious website is almost an exact replica of the original site.

  1. DNS Hijacking

During DNS hijacking, the targeted server’s Internet connection is taken over and reconfigured. This process is often administered by the use of malware. From there, the hacker redirects online users to a different, malicious IP address.

]]>
<![CDATA[America’s Internet Attacked by Massive DDoS]]> https://www.psafe.com/en/blog/americas-internet-attacked-by-massive-ddos/ Fri, 21 Oct 2016 23:37:45 +0000 https://www.psafe.com/en/blog/?p=5009 Today a DDoS attack took out a major piece of Internet infrastructure in America and Europe. Hackers were able to compromise the security of several smartphones and computers in order to escalate their attack.

We recommend PSafe Total users click below to Scan for Viruses immediately:

Run Virus Scan
Sites affected include Netflix, Spotify, Airbnb, Soundcloud Twitter and Github. DDoS or denial-of-service attack occurs whenever a hacker floods servers that run select internet traffic until it collapses under the load. This attack is sophisticated enough to become more harmful and take over core internet infrastructure providers.

Emilio Simoni, PSafe’s Senior Security Researcher, confirms that for doing an attack such as this, it was necessary for many “zombie” computers and devices to be infected by a malware. “It created a big Botnet (device’s network controlled by a hacker for a specific goal).

In order to get device secured from the Botnet, it’s necessary to keep a reliable antivirus installed and download apps only by reliable sources

Run Virus Scan

]]>