Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More
Read More
Back in April I wrote a blog post where I stated that in my opinion nothing in the world of digital data is unbreakable or impenetrable and that LifeLock, an... Read More
Read More
For the month of August, Microsoft unleashed 11 new Security Bulletins- 6 of them rated as Critical and 5 Important. There are vulnerabilities affecting a wide range of Microsoft technologies... Read More
Read More
Read More
The Blackhat 2008 security conference was held recently in Las Vegas. Along with the RSA Security conference held in San Francisco at the beginning of each year, Blackhat is one... Read More
Read More
Friday, September 5, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment