942 Results for:DNS

  • Sort by: 

How to execute a Windows Server 2012 file server migration

By Brien Posey 27 Jun 2023

The Storage Migration Service can reduce the stress involved with shifting the data from the outdated file server operating system to one with a newer version of Windows Server. Read More

Email authentication: How SPF, DKIM and DMARC work together

By Peter Loshin 19 Aug 2022

Internet protocols for email authentication -- SPF, DKIM and DMARC -- coordinate defense against spammers, phishing and other spoofed email problems. Read More

U.S. government domain officials to start using 2FA

By Michael Heller 09 Oct 2018

The government domain registrar -- DotGov -- began rolling out two-factor authentication for officials managing .gov domains in order to mitigate against DNS hijacking. Read More

Is network traffic monitoring still relevant today?

By Johannes Ullrich 29 Nov 2018

An increase in DNS protocol variants has led to a higher demand for network traffic monitoring. The SANS Institute's Johannes Ullrich explains what this means for enterprises. Read More

How DKIM records reduce email spoofing, phishing and spam

By Peter Loshin 20 Sep 2022

Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Read More

Botnet detection through DNS behavior and clustering analysis

06 Apr 2011

Botnets are fast emerging as one of the most serious threats to Internet security today. This expert tip looks at how botnets can be detected analyzing their unique fast flux characteristics. Read More

How is the Trezor cryptocurrency online wallet under attack?

By Nick Lewis 15 Nov 2018

A phishing campaign targeting Trezor wallets may have poisoned DNS or hijacked BGP to gain access. Learn how the attack worked and how to mitigate it with expert Nick Lewis. Read More

How SPF records prevent email spoofing, phishing and spam

By Peter Loshin 25 Aug 2022

Forged email has long been used by hackers to break into protected systems. Learn how the Sender Policy Framework protocol helps stop spoofing, phishing and other malicious mail. Read More

5 network security predictions for 2024

By John Grady 04 Dec 2023

Check out network security trends for 2024 from Enterprise Strategy Group, from SaaS security and rising DDoS attacks to network and endpoint convergence. Read More

What to know about UDP vulnerabilities and security

By David Jacobs 20 Oct 2023

UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Read More