On Tuesday, security researcher Dan Kaminsky of IO Active calmly explained in a conference call with security reporters how he first stumbled upon a pervasive flaw deep within the Domain Name System (DNS), a series of servers used to translate common Internet names to IP addresses. Kaminsky said he wasn't even looking for a security vulnerability. What he found, however, could explain how criminal hackers have been able to redirect DNS queries recently.
Following a security researcher's announcement of a massive, multivendor patch release, Cisco on Tuesday issued a patch for its products vulnerable to DNS cache-poisoning attacks.
In an advisory, Cisco cited its IOS software, Network Registrar, Application and Content Networking System, and Global Site Selector used in combination with Cisco Network Registrar among those directly affected by the vulnerability announcement.
Earlier Tuesday, Microsoft released its patch for the same DNS vulnerability.
Its name may not be as menacing as the "Radio Active" watch, but this timepiece could be right out of a '50s B-movie in all its grainy atomic glory. Just like the creatures and objects regularly exposed to dangerous radiation levels at drive-ins across America every Saturday night in those days, the "Superluminova" made by Reactor Watches will glow day and night for a full 10 years.