942 Results for:DNS
- Sort by:
How to execute a Windows Server 2012 file server migration
27 Jun 2023The Storage Migration Service can reduce the stress involved with shifting the data from the outdated file server operating system to one with a newer version of Windows Server. Read More
Email authentication: How SPF, DKIM and DMARC work together
19 Aug 2022Internet protocols for email authentication -- SPF, DKIM and DMARC -- coordinate defense against spammers, phishing and other spoofed email problems. Read More
U.S. government domain officials to start using 2FA
09 Oct 2018The government domain registrar -- DotGov -- began rolling out two-factor authentication for officials managing .gov domains in order to mitigate against DNS hijacking. Read More
Is network traffic monitoring still relevant today?
29 Nov 2018An increase in DNS protocol variants has led to a higher demand for network traffic monitoring. The SANS Institute's Johannes Ullrich explains what this means for enterprises. Read More
How DKIM records reduce email spoofing, phishing and spam
20 Sep 2022Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Read More
Botnet detection through DNS behavior and clustering analysis
06 Apr 2011Botnets are fast emerging as one of the most serious threats to Internet security today. This expert tip looks at how botnets can be detected analyzing their unique fast flux characteristics. Read More
How is the Trezor cryptocurrency online wallet under attack?
15 Nov 2018A phishing campaign targeting Trezor wallets may have poisoned DNS or hijacked BGP to gain access. Learn how the attack worked and how to mitigate it with expert Nick Lewis. Read More
How SPF records prevent email spoofing, phishing and spam
25 Aug 2022Forged email has long been used by hackers to break into protected systems. Learn how the Sender Policy Framework protocol helps stop spoofing, phishing and other malicious mail. Read More
5 network security predictions for 2024
04 Dec 2023Check out network security trends for 2024 from Enterprise Strategy Group, from SaaS security and rising DDoS attacks to network and endpoint convergence. Read More
What to know about UDP vulnerabilities and security
20 Oct 2023UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Read More