Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Submission + - All browsers vulnerable to DNS Rebinding 1

getOpera writes: "DNS rebinding was discovered in 1996 and affected the Java Virtual Machine. Recently a group of researchers at Stanford found out that this vulnerability is still present in browsers and that the common solution, known as DNS pinning, is not effective anymore. Securityfocus tracked down one of the authors of the study, Adam Barth, to learn about the impact of the problem, which workarounds can be deployed right now, and how to protect browsers from DNS rebinding attacks in the long run. You can use the online test to check your software."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

All browsers vulnerable to DNS Rebinding

Comments Filter:

Take your work seriously but never take yourself seriously; and do not take what happens either to yourself or your work seriously. -- Booth Tarkington