Quantcast
Channel: DNS Security – LookingGlass Cyber Solutions Inc.
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Blocking DNS Covert Channel Attacks

Blocking DNS Covert Channel Attacks Part 1 of 5 DNS is a boon to the non-technical Internet user, simplifying address determination by providing more intuitive, human-readable uniform resource locator...

View Article



Image may be NSFW.
Clik here to view.

The Importance of DNS Planning

The Importance of DNS Planning Prepare for other DNS events DNS overlooked Apart from a few exceptions, DNS has been overlooked inside large telcos and ISPs around the world, usually sitting in a grey...

View Article

Image may be NSFW.
Clik here to view.

Five DNS Security Tips

Five DNS Security Tips Highlights from the McAfee FOCUS Event DNS protocol at FOCUS FOCUS is a large security event hosted by McAfee and is a platform for security professionals to exchange ideas, real...

View Article

Image may be NSFW.
Clik here to view.

U.S. Banks Caught in a Cyberwar

U.S. Banks Caught in a Cyberwar Get tighter security around your DNS infrastructure Cyberwar. What is it good for? (Absolutely nothin’) “Mrt. Izz ad-Din al-Qassam Cyber Fighters” is a hacker group...

View Article

Image may be NSFW.
Clik here to view.

Would Dual Custody Mean Better DNS Security?

Would Dual Custody Mean Better DNS Security? Why we should bring two person authorization to the DNS world The 1983 sci-fi thriller movie, WarGames, opens with a scene where two men receive orders to...

View Article


Image may be NSFW.
Clik here to view.

Blocking DNS Covert Channel Attacks: Encoding Algorithms

Blocking DNS Covert Channel Attacks: Encoding Algorithms Part 2 of 5 I previously introduced the idea of detecting and/or blocking the covert exfiltration of data via the DNS query protocol. That...

View Article

Image may be NSFW.
Clik here to view.

DNS Covert Channel Attacks: Detecting Anomalies

DNS Covert Channel Attacks: Detecting Anomalies Part 3 of 5 In part 1 of this series, I introduced the idea of detecting and blocking data being exfiltrated or infiltrated using the DNS protocol. Part...

View Article

Image may be NSFW.
Clik here to view.

DNS Covert Channel Attacks: Anomaly Occurrence

DNS Covert Channel Attacks: Anomaly Occurrence Part 4 of 5 In the prior articles of this series (1, 2, 3), I introduced and expanded on the idea of detection of data being exfiltrated or infiltrated...

View Article


Image may be NSFW.
Clik here to view.

DNS Covert Channels: Solution Design and Implementation

DNS Covert Channels: Solution Design and Implementation Part 5 of 5 We are finally nearing the end of our series on “DNS Covert Channel Attacks”. So far, we have looked at the DNS data exfiltration...

View Article


Image may be NSFW.
Clik here to view.

A Difficult New DNS DDoS Attack

A Difficult New DNS DDoS Attack Learn what bots are doing and how they take down DNS More and more DNS administrators know that attackers can use reflection or request open recursive DNS servers to...

View Article

Image may be NSFW.
Clik here to view.

Keep DNS Protected With Actionable Security Insight

Keep DNS Protected With Actionable Security Insight Understanding DNS traffic Can you be sure your business isn’t experiencing a DNS attack right now? In this post, I’ll discuss how insight into your...

View Article

Image may be NSFW.
Clik here to view.

A Difficult New DNS DDoS Attack

A Difficult New DNS DDoS Attack – Chris Donovan Learn what bots are doing and how they take down DNS More and more DNS administrators know that attackers can use reflection or request open recursive...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images