Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
Security

Submission + - All browsers vulnerable to DNS Rebinding 1

getOpera writes: "DNS rebinding was discovered in 1996 and affected the Java Virtual Machine. Recently a group of researchers at Stanford found out that this vulnerability is still present in browsers and that the common solution, known as DNS pinning, is not effective anymore. Securityfocus tracked down one of the authors of the study, Adam Barth, to learn about the impact of the problem, which workarounds can be deployed right now, and how to protect browsers from DNS rebinding attacks in the long run. You can use the online test to check your software."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

All browsers vulnerable to DNS Rebinding

Comments Filter:

Machines that have broken down will work perfectly when the repairman arrives.

Working...