"Client-Side DNS Attack Emerges From Academic Research"
A new DNS poisoning attack that targets the client-side DNS cache has been presented by a team of researchers. The attack can be launched through the exploitation of a vulnerability in mDNSResponder. Researchers successfully demonstrated the attack on Android, Ubuntu Linux, MacOS, and Windows. This article continues to discuss the research and discoveries behind the new DNS cache poisoning attack in addition to the impact of academic research on commercial computing.
Dark Reading reports "Client-Side DNS Attack Emerges From Academic Research"
Submitted by Anonymous
on