Internet Systems Consortium - News, Features, and Slideshows
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers running recent releases of BIND 9.
By Lucian Constantin | 06 June, 2013 11:50
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines.
By Lucian Constantin | 29 March, 2013 17:12
Security roundup for week ending Nov. 18: Facebook, Norway oil-industry cyberattacks, and why virtualization and mobile devices mean security stress
Last week's flood of pornographic and violent images that hit Facebook was a coordinated spam attack that caught the attention of the world. But less remarked-upon and perhaps more sinister was what may have been a denial-of-service attack on many organizations' DNS servers, based on an exploit of the BIND 9 protocol, temporarily knocking their networks offline. The Internet Systems Consortium (ISC), which maintains several software products essential for Internet infrastructure, released a patch that's something of an interim fix for this and said it would conduct an investigation. This kind of attack -- which incapacitates entire networks, as it did in this case -- is truly worrisome.
By Ellen Messmer | 19 November, 2011 05:36
The Internet Systems Consortium (ISC), an organization that maintains several software products critical for Internet infrastructure, has released a patch for an actively exploited denial-of-service vulnerability in the widely used BIND DNS server.
By Lucian Constantin | 18 November, 2011 01:31
In the current market, there is an increasing demand for unbiased information about Enterprise Mobility Management (EMM) solutions. This white paper focuses on solutions that are anticipated to have an important role in Enterprise Mobility Management. An overview of features has been created to enable a better understanding and comparison of capabilities.
Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.
- Infrastructure remains big barrier for big data
- Microsoft parental control update lets kids browse more than they should
- Uber grabs mapping tech, employees from Microsoft
- MIT tests 'software transplants' to fix buggy code
- 5 facets of the coming Internet of Things boom
- Hyundai sees hydrogen fuel cell cars as the future
- Fibre broadband adds 3 per cent a US home's value
- LTE-U is coming to take your Wi-Fi away, consumer advocates warn
- Microsoft claims its lens system can improve the Rift's vision
- PayPal tweaks terms in wake of 'robocall' controversy
- Cisco says its IoT parts are now a whole
- Oracle seeks to simplify e-store creation, management with new Commerce Cloud
- US Supreme Court denies Google request in Java infringement case
- iOS, iTunes upgrades for Apple Music available early Tuesday
- Cybercriminals adopt recently patched zero-day exploit in a flash