No Image

How to check if your DNS Server was hacked

Post initially published in Avira Techblog. You must have heard already about the already “famous” malware DNSChanger which manipulates the DNS settings of the computer in order to silently direct the users to malicious websites. FBI and others took action against this malware and in November 2011 have managed to break the botnet. According to FBI, more than 4 million computers were affected world-wide. The thieves manipulated DNS entries in order to block antivirus programs and the operating systems to update delivering this way even more malware on users’ computers. The DNSChanger malware was used also to redirect users to rogue servers controlled by the fraudsters, allowing them to control users’ web activity and generate income through online advertising. When FBI shut down the botnet, they also replace the servers which were directing to malicious domains with valid DNS servers. So, if the botnet is shut down why all this trouble? FBI will deactivate those new valid DNS servers on March 8, 2012. If your computer was infected at some point in time and it was using one of the DNS servers which are now controlled by FBI, after March 8, it will no longer be able to make any DNS…

No Image

About cyberterrorism

How do you define cyberterrorism? The definition of cyberterrorism is since the 90s highly debated because it is not easy to define how devastating the damages of a computer attack are. However, according to many sources in the Internet, it appears that the definition of to the U.S. Federal Bureau of Investigation is the one accepted by many people. According to the FBI, cyberterrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”. Unlike virus or computer attack that results in a (distributed) denial of service, a cyberterrorist attack is designed to cause physical violence or extreme financial harm. Possible cyberterrorist targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. This definition is quite narrow because it compares cyberterrorism with traditional terrorism. There are several other definitions which define it much more generally as any computer crime targeting computer networks without necessarily affecting real world infrastructure, property, or lives.     Do you think the threat of cyberterrorism is real?  Why or why not? It all depends about which definition of Cyberterrorism are we talking…

%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.