Wednesday, February 28, 2018

Word of the Day: DNS redirection

Word of the Day WhatIs.com
Daily updates on the latest technology terms |February 28, 2018
DNS redirection

DNS redirection was the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected. In the early days of the internet, an ISP would typically serve an ad-based page when the user mistyped a URL, rather than a 404 error message,

In July 2009, Comcast announced it would test DNS redirection, under the name "Domain Name Helper Service," in Arizona, Colorado, New Mexico, Oregon, Texas, Utah, and Washington. Other ISPs that implemented DNS redirection include Verizon, Cox, Earthlink and Charter. The practice was generally not popular among consumers and is no longer a source of revenue for ISPs.

DNS redirection differs from DNS poisoning, in which an attacker gains access to a server's DNS table and substitutes a rogue address for a valid one. Fake companies have been set up to sell billions of hijacked IP addresses. Fraud, forgery and identity theft are involved with these hijackings.

The recent rise in DNS poisoning, also referred to as IP hijacking, can partially be attributed to hackers who find the WHOIS database an easy target. By making unauthorized changes to registration records, hackers have been able to hijack existing IP address ranges created before the American Registry for Internet Numbers' (ARIN's) inception in 1997. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location.

Quote of the Day

"DNS is a mission-critical service for enterprises, and it is also a gold mine of valuable data for protecting your enterprise." - Nick Lewis

 

Trending Terms

cache poisoning
DNS attack
DNS Security Extensions
CNAME
MX record
404 status code

 
Learning Center

How did OurMine hackers use DNS poisoning to attack WikiLeaks?
A WikiLeaks attack was recently exposed by the hacking group OurMine. Nick Lewis shares how the hackers used DNS poisoning to take over the web address.

Use PowerShell for help with DNS server management
With assistance from PowerShell, the IT staff can save time by building scripts for DNS server management and modifications to DNS records.

DNS functions remain vital, but must adapt as demands shift
DNS functions remain vital. However, the proliferation of devices, especially those that are IPv6-only, present a challenge to this network protocol.

Hospital network security: Recursive DNS lookups yield threat insight
One health system uses recursive DNS lookups and deep insight into threat intelligence to ensure hospital network security.

Don't let IPv6 and IoT question the purpose of DNS
DNS challenges, from IPv6 to the complexities of IoT, must be overcome, since a smooth-functioning domain name system remains essential for networking.

Writing for Business

Although ISPs promote DNS redirection as a service to customers, customers typically think the ISPs have _______ motives.

a. alterior
b. ulterior

Answer


 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

The tech marketing arms race | PLUS: AI in the enterprise - A framework for success

ITKnowledgeExchange - a TechTarget Expert Community Follow us on Facebook Follow us on Twitter
 
FEB
28
Community Update
 
 
 
The tech marketing arms race
 
By Matt Heusser on Uncharted Waters

If you've driven down a major highway lately, you have most likely seen more outlandish billboards. Why? Because ad executives need to captivate the audience and that's exactly what's happening in the technology world too.
 
 
 
 
 
 
MORE IT STORIES
 
IT resiliency report: Downtime holding businesses up
 
AR/VR is changing the way enterprises do business - ready to jump in?
 
TeamViewer partner program update reveals shift in strategy
 
 
 
 
 
AI in the enterprise - A framework for success
 
By Nicole Laskowski on TotalCIO

For many organizations, AI in the enterprise is uncharted territory. Here's a simple 'framework' that CIOs should follow for artificial intelligence.
 
 
 
 
 
 
MORE FROM THE TECHTARGET NETWORK
 
Windows 7 still activates Windows 10
 
By Ed Tittel on Windows Enterprise Desktop

After doing some maintenance on one of his laptops, Ed Tittel noticed something particularly interesting: Windows 7 actually still activates Windows 10. Here's how he found out.
 
 
 
About This Email
You're getting this email because you subscribed to Community Updates on ITKnowledgeExchange.com. If you'd no longer like to follow this tag, you can unsubscribe here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

Building Data Lakes in the Cloud

 
Building Data Lakes in the Cloud
Recently, data lakes have gained increased attention as a technology for capturing and analyzing big data effectively at scale, but they come with a variety of deployment options and considerations you’ll need to take into account.

This webcast explores your platform and tool options for deploying data lakes either on-premise or in the cloud. Discover the pros and cons of Hadoop-based data lakes, and learn about topics, like:
  • Data lakes: Definitions and key drivers for adoption
  • Use cases for data lakes across operations, analytics, and compliance
  • Hadoop’s effects on data lake success
  • And more
Sponsored by: Oracle Corporation
VIEW NOW
More on This Webcast:
About the Speakers:
Philip Russom, PH. D., Senior Research Director for Data Management, TDWI
 
Erik Bergenholtz, Vice President, Software Development, Big Data, Cloud, Oracle
ABOUT THIS E-NEWSLETTER

This email is published by the TechTarget Business Applications and Architecture Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group.

Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.
VIEW NOW
SPEAKERS

Philip Russom, PH. D.
Senior Research Director for Data Management, TDWI 

Erik Bergenholtz
Vice President, Software Development, Big Data, Cloud, Oracle 

Data warehouses on premises vs. cloud: What are the differences?

 
Data warehouses on premises vs. cloud: What are the differences?
Traditional physical data warehouses were great for collecting data for analysis.

But the storage and compute resources needed to support physical warehouses can’t always keep pace with data’s explosive growth.

Discover the benefits of moving your data warehouses to the cloud, including:
  • Simplified deployment and migration
  • Reduced cost and risk
  • Accelerated analytics
  • Less chance of human errors
  • And more
This asset is part of an Oracle Learning Experience, you will be contacted by an Oracle sales rep to discuss your needs and how this piece fits into your research efforts.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Business Applications and Architecture Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group.
Go to unsubscribe.

TechTarget Business Applications and Architecture Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

2018 IT Priorities survey forecasts bigger tech budgets; the obstacles to secure cloud ERP

IT Strategy Digest
Content from TechTarget's global network for CIOs and IT Leaders |Feb. 28, 2018
TechTarget
NEWS
Cloud, app dev highlight IT budget management priorities for 2018
Rich Castagna, Vice President of Editorial
TechTarget's exclusive 2018 IT Priorities survey sheds some light on IT budget management plans for the data center, cloud projects and hybrid technologies. (SearchCIO.com)
Advertisement
NEWS
 
Deep learning algorithms power startup's beauty database
Deep learning algorithms are changing how we drive cars and navigate outer space. What about saving our skin? Silicon Valley startup Proven Beauty has a plan. (SearchCIO.com)
 
Digital transformation plan: RPA and BPMS tools, better together
A sound digital transformation plan gives companies the ability to change quickly. Business process management suites and robotic process automation -- used together -- do that. (SearchCIO.com)
 
IT security for ERP on the move to cloud
Where does the data live? Who -- the provider or the customer -- is responsible for securing what? They're vital questions to ask when mulling a cloud move, a new report posits. (SearchCIO.com)
 
Gearing up to meet GDPR compliance requirements
In this webcast, attorney Nicholas Merker discusses the necessary steps companies should be taking to meet the EU's looming GDPR compliance requirements. (SearchCompliance.com)
EXPERT ADVICE
 
Relentless AI cyberattacks will require new protective measures
AI cyberattacks won't be particularly clever; instead, they'll be fast and fierce. Carnegie Mellon University's Jason Hong explains in this episode of ''Schooled in AI.'' (SearchCIO.com)
 
Study: Cybersecurity's shortage of skills leaves IT projects vulnerable
A recent study found that as IT projects proliferate, cybersecurity's shortage of skills is leaving tech vulnerable. Analyst and study author Jon Oltsik explains in this Q&A. (SearchCIO.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from IT Strategy Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget CIO and IT Management Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

Why APIs are key to closing the IT delivery gap

Hi David,

Sharing with you this article written by MuleSoft's founder, Ross Mason. In the article, Ross details how businesses should correctly manage their IT initiatives in order to thrive in the "Fourth Industrial Revolution."

The article discusses how we're in the early stages of the Fourth Industrial Revolution, as companies can come to life in just a few weeks, scale globally and proceed to turn entire industries on their heads. In a world where disruption can happen instantly, IT teams must drive agility, speed, and connectivity, all while remaining flexible enough to change with consumer tastes to guard from disruption. Mason also explains that APIs are the building blocks that help teams deliver on these initiatives in a fast paced and reusable manner, and how leading organizations are achieving these initiatives.

If you and your team are working on your organization's API strategy, would love to discuss how we've worked with other players to drive similar approaches.

Thanks,

Krista Hardebeck, API Integration & Enablement, MuleSoft
77 Geary Street, Suite 400, San Francisco, CA, 94108 

If you no longer wish to receive these emails, click here to unsubscribe.

Adopting Agile development: 4 key considerations

TechTarget
Business Technology Research     February 28, 2018
TechTarget
IN THIS ISSUE
Adopting Agile development: 4 key considerations
SPONSORED BY: CA Technologies
Once considered cutting-edge, Agile development is now becoming a must-have methodology for companies looking to compete in the app economy and combat forces like digital disruption. Uncover4 key considerations for adopting Agile and learn how it accelerates high-quality app development.
GDPR: Discover who the legislation affects
SPONSORED BY: Commvault
The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

SAML vulnerability puts single sign-on systems in jeopardy

Security Digest
Information security news and advice from TechTarget's network| February 28, 2018
TechTarget
FEATURED STORY
New SAML vulnerability enables abuse of single sign-on
by Rob Wright, Executive Editor
Duo Security discovered a new SAML flaw affecting several single sign-on vendors that allows attackers to fool SSO systems and log in as other users without their passwords. (SearchSecurity.com)
Advertisement
NEWS
 
Ad network cryptojacking attack bypasses ad blockers
Qihoo 360's Netlab team discovered an online ad network has been bypassing ad blockers and running cryptomining software in the browsers of unsuspecting visitors. (SearchSecurity.com)
 
SEC cybersecurity disclosure rules get a guidance update
The U.S. Securities and Exchange Commission introduced new SEC cybersecurity disclosure rules to prevent insider trading related to data breaches and other security incidents. (SearchSecurity.com)
 
Risk & Repeat: Intel bug bounty tackles side channel attacks
In this week's Risk & Repeat podcast, SearchSecurity editors examine Intel's new bug bounty for side channel attacks and what it says about Meltdown and Spectre. (SearchSecurity.com)
 
Hackers used SWIFT-based attacks to steal millions from banks
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more. (SearchSecurity.com)
 
Cryptojacking attacks hit enterprises' cloud servers
Cloud security vendor RedLock discovered threat actors had gained access to several enterprise cloud environments, including Tesla's, and used them for cryptojacking schemes. (SearchSecurity.com)
 
Google discloses Microsoft Edge vulnerability without a patch
Google's Project Zero publicly published an Edge browser vulnerability after the 90-day disclosure deadline expired, and Microsoft has yet to patch the flaw. (SearchSecurity.com)
EXPERT ADVICE
 
Web vulnerability scanners: What you won't learn from vendors
Web security flaws are a serious issue that web vulnerability scanners can manage. Discover your best fit scanner as expert Kevin Beaver shares tips that vendors won't tell you. (SearchSecurity.com)
 
How hard will the GDPR right to be forgotten be to get right?
Under GDPR, the right to be forgotten is granted to all EU data subjects. Mimecast's Marc French explains why enterprises will need to be careful about how they manage the process. (SearchSecurity.com)
 
How cloud access security brokers have evolved
Cloud access security brokers keep being acquired by bigger security companies. Expert Rob Shapland looks at how these acquisitions have changed the CASB industry. (SearchCloudSecurity.com)
 
Uber breach: How did a private GitHub repository fail Uber?
The recent Uber breach calls into question the use of code repositories. Expert Matt Pascucci explains how the breach of GitHub and Amazon Web Services occurred. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

The Internet of Things - Challenges and Opportunities

Watch this video to learn about some of the challenges in IoT and how IoT Analytics can help!

Hello David,

IT professionals have educated us on the wide range of challenges they face since we launched VIA, the major update to our IoT Analytics Platform. The group represents a range of industries have helped us refine and improve VIA and continue to simplify and streamline the process of implementing IoT Analytics.

We have learned it is difficult to communicate the scope of these challenges - and the potential solutions - to the broader group of their organizations working on IoT applications.

IoT is complex, and it can be tempting to focus on technology issues but managers should instead focus on asking if the project delivers business value quickly.

We built VIA with that focus in mind and our mission is to empower our customers and partners to rapidly create business value from IoT and Real-Time Analytics.

To help IT professionals like you communicate the challenges and focus teams on how to create business value with IoT Analytics, we have created a video: The Internet of Things – Challenges and Opportunities. It is only 2-1/2 minutes in length and you may find it an effective tool for communicating with your teams about IoT Analytics and business value.

Would you like to see our Cloud of Things White Paper to implement Cloud of Things analytics in your organization? 

As always please feel free to contact us anytime at iotanalytics@vitria.com

Warm Regards,
Biyu Hua
Product Management
650-460-8624 | bhua@vitria.com

http://www.vitria.com/

Follow us on Linkedin