Join thousands of people who receive the latest breaking cybersecurity news every day.
Bruce Schneier talks to Mike Mimoso about information he was given regarding an increase in DDoS and probing attacks targeting companies running core internet infrastructure in an attempt to test their defenses.
Verisign, the Internet security company responsible for management of the .COM domain, told federal regulators that it was the victim of several successful attacks in 2010, but that those incidents were not reported to the company’s management until September, 2011. The news was first reported by Reuters.
The DNS Security Extensions (DNSSEC) will be equipped for the “.com” entity by March 31, according to a PCMag.com report.While DNSSEC enhances DNS security as it is, the newly added .com security will act as an extra layer of protection, according to according to Matt Larson, the Vice President of DNS Research at Verisign.
Yesterday (Wednesday) the last of the 13 authoritative root servers for the domain name system switched over to
the DNS Security Extensions (DNSSEC) security protocol. DNSSEC is
intended to prevent DNS exploits such as cache poisoning. All 13 root
servers are now serving a signed version of the root zone. However, it
is not possible to validate these signatures at present as the public
key remains undisclosed. Read the full article. [The H Security]
InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.