Tag

DNS hijacking

0 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Aug 11, 2024 · Information Security

Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod

Tencent Cloud DNSPod uncovered a massive May‑2024 campaign that hijacked home routers by altering their DNS settings to malicious IPs—using default credentials and firmware flaws—to redirect users to phishing or illegal sites, urging owners to check router DNS, reset devices, and change passwords.

DNS hijackingdig commandmalicious DNS
0 likes · 5 min read
Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
DevOps
DevOps
Feb 10, 2022 · Operations

Eight Real-World Online Failure Cases and Their Resolution Strategies

The article presents eight authentic production incidents—including JVM Full GC, memory leaks, idempotency flaws, cache avalanches, disk‑I/O thread blocking, MySQL deadlocks, DNS hijacking, and bandwidth exhaustion—detailing their causes, diagnostics, and practical remediation steps for engineers.

Bandwidth ExhaustionCache AvalancheDNS hijacking
0 likes · 15 min read
Eight Real-World Online Failure Cases and Their Resolution Strategies
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jun 7, 2016 · Information Security

Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures

The article explains what HTTP and DNS hijacking are, illustrates real‑world examples, analyzes root causes such as ad injection and ISP caching, describes the resulting harms, and presents practical anti‑hijack techniques including data validation, HttpDNS, and logging strategies.

DNS hijackingHTTP hijackinganti‑hijack
0 likes · 8 min read
Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Aug 9, 2015 · Information Security

Understanding HTTP Hijacking and DNS Hijacking: Causes, Impacts, and Countermeasures

The article explains what HTTP and DNS hijacking are, illustrates real‑world examples, analyzes their causes and harms, and presents practical anti‑hijacking techniques such as data validation, HttpDNS, operator cache handling, and logging systems.

Anti‑HijackingDNS hijackingHTTP hijacking
0 likes · 11 min read
Understanding HTTP Hijacking and DNS Hijacking: Causes, Impacts, and Countermeasures
Architect
Architect
Jul 19, 2015 · Information Security

Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps

This article explains the mechanisms of HTTP and DNS hijacking, illustrates real‑world examples, analyzes their causes and impacts on mobile applications, and presents practical anti‑hijacking techniques such as data validation, HttpDNS, ISP cache handling, illegal redirect blocking, and monitoring strategies.

Anti‑HijackingDNS hijackingHTTP hijacking
0 likes · 10 min read
Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps