Spoofing

Results: 545



#Item
321Computing / DNS spoofing / Name server / Root name server / MX record / Domain name / CNAME record / Authoritative Name Server / Extension mechanisms for DNS / Domain name system / Internet / Network architecture

A Formal-Speci cation Based Approach for Protecting the Domain Name System Steven Cheung Department of Computer Science Universit yof California Davis, CA 95616

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:32
322Telecommunications / Caller ID spoofing / Deception / Telephone numbers / Telephone call / National Do Not Call Registry / Toll-free telephone number / Phone fraud / Telephony / Caller ID / Electronic engineering

Calls from Your Own Phone Number—How is it Possible? From the Office of Minnesota Attorney General Lori Swanson “Shelly” and her family sat down to dinner when the phone rang. Before she answered the call, Shelly l

Add to Reading List

Source URL: www.ag.state.mn.us

Language: English - Date: 2014-11-19 12:24:23
323Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / Root name server / OpenDNS / BIND / Denial-of-service attack / Comparison of DNS server software / Domain name system / Internet / Computing

The Continuing Denial of Service Threat Posed by DNS Recursion

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:50
324Private Mail Bag / United States Postal Service / 000 Emergency / Mail / Fee / Communication / Caller ID spoofing / Caller ID / Postal system / Telephony / Post-office box

How to Apply for Post Office Caller Service! The Safe Convenient Way to Get Your Mail Caller Service is a premium service available for a fee to any customer who:

Add to Reading List

Source URL: es-about.usps.com

Language: English - Date: 2014-01-21 14:57:14
325Electronic engineering / Electronics / Social engineering / Spamming / Fraud / Caller ID spoofing / Telephony / Caller ID / Malware

Traffic Light Protocol: WHITE Cyber Intel Advisory November 3, 2014, IA2014[removed]Tech Support Call Scam Leads to Malware & Financial Loss

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-11-04 09:51:02
326Computing / Anycast / Domain Name System Security Extensions / Name server / Denial-of-service attack / OpenDNS / DNS spoofing / Root name server / Domain name system / Internet / Network architecture

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDOS ATTACK AGAINST THE DNS INFRASTRUCTURE

Add to Reading List

Source URL: cira.ca

Language: English - Date: 2014-10-20 10:46:47
327Computing / Anycast / Root name server / DNS spoofing / TSIG / Name server / Distributed denial of service attacks on root nameservers / Dns.com / Domain name system / Internet / Network architecture

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE PROTECT YOUR BUSINESS

Add to Reading List

Source URL: cira.ca

Language: English - Date: 2014-10-20 10:46:48
328Domain name system / Spamming / System software / Malware / Zlob trojan / Botnet / DNS spoofing / Computing / Computer network security / Internet

DNS  Traffic  Monitoring   Dave  Piscitello   VP  Security,  ICANN   Modern  malware  use     domain  names  and  DNS  

Add to Reading List

Source URL: www.securityskeptic.com

Language: English - Date: 2014-10-30 07:42:38
329Computer network security / Akamai Technologies / Content delivery network / Application firewall / Network performance / Denial-of-service attack / Load balancing / DNS spoofing / Anycast / Computing / Internet / Network architecture

White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications Table of Contents

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2012-01-25 15:24:03
330Network architecture / Denial-of-service attack / Name server / Dns.com / ICANN / Anycast / DNS spoofing / Domain name system / Internet / Computing

SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure SAC065 SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure  

Add to Reading List

Source URL: www.icann.org

Language: English - Date: 2015-01-04 13:30:21
UPDATE