Internet Systems Consortium - News, Features, and Slideshows
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers running recent releases of BIND 9.
By Lucian Constantin | 06 June, 2013 11:50
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines.
By Lucian Constantin | 29 March, 2013 17:12
Security roundup for week ending Nov. 18: Facebook, Norway oil-industry cyberattacks, and why virtualization and mobile devices mean security stress
Last week's flood of pornographic and violent images that hit Facebook was a coordinated spam attack that caught the attention of the world. But less remarked-upon and perhaps more sinister was what may have been a denial-of-service attack on many organizations' DNS servers, based on an exploit of the BIND 9 protocol, temporarily knocking their networks offline. The Internet Systems Consortium (ISC), which maintains several software products essential for Internet infrastructure, released a patch that's something of an interim fix for this and said it would conduct an investigation. This kind of attack -- which incapacitates entire networks, as it did in this case -- is truly worrisome.
By Ellen Messmer | 19 November, 2011 05:36
The Internet Systems Consortium (ISC), an organization that maintains several software products critical for Internet infrastructure, has released a patch for an actively exploited denial-of-service vulnerability in the widely used BIND DNS server.
By Lucian Constantin | 18 November, 2011 01:31
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTStudio Design ManagerVIC
- FTAcquisition Marketing ExceutiveNSW
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices.
- Thwarting attackers with threat intelligence
- Segmenting for security: Five steps to protect your network
- Breaking up Google is just one possible antritrust option, EU lawmakers say
- 5 essentials of effective cloud data integration, a customer perspective
- 'Less' means more to malware authors targeting Linux users
- UK plans to introduce new Web snooping law
- NXP opens wallet to build wearables with better battery life
- Senate backs Ludlam on data retention costs
- Merchants welcome Square to Australia
- Report: Samsung's head of TVs may be asked to revitalize mobile business
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale