Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - All browsers vulnerable to DNS Rebinding 1

Submitted by
getOpera
getOpera writes "DNS rebinding was discovered in 1996 and affected the Java Virtual Machine. Recently a group of researchers at Stanford found out that this vulnerability is still present in browsers and that the common solution, known as DNS pinning, is not effective anymore. Securityfocus tracked down one of the authors of the study, Adam Barth, to learn about the impact of the problem, which workarounds can be deployed right now, and how to protect browsers from DNS rebinding attacks in the long run. You can use the online test to check your software."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

All browsers vulnerable to DNS Rebinding

Comments Filter:

Don't be irreplaceable, if you can't be replaced, you can't be promoted.

Working...