Welcome!

Blog Feed Post

Ultra AEP warns of on-going danger of ‘dirty domains’

Only 53 per cent of global top level domains 'secure'

Loudwater, UK, 23rd January 2014: Over three years after the world's first top level domains (TLDs) (such as .org, .com and .net) were signed with domain name system security extensions (DNSSEC), nearly half (47 per cent)[1] remain open to malicious tampering. This is potentially leaving millions of the world's internet users open to malicious redirect to fake websites, warns FTSE 250 cyber security company Ultra Electronics AEP.

Some of the world's most advanced Internet economies such as Italy (.it), Spain (.es) and South Africa (.za) remain unsigned, leaving every Internet visitor to a website ending with that extension at risk of being re-routed to a bogus website and potentially being fooled into parting with personal information.

Sonia Freed, Managing Director of Ultra Electronics AEP explains: "This is an issue that affects every Internet user in the world and a poor level of take up of DNSSEC amongst top level domains is a barrier to the evolution of a safer Internet. Unless the top level domain is signed, every single website operating under a national domain can have its DNS spoofed, potentially directing Internet users straight into the hands of cyber criminals via fake websites that often look just like the real thing."

Freed continues: "Whilst many of the domains we are familiar with such as .com, co.uk and .org are secure, it's becoming increasingly common for websites to use extensions from other countries even when they do not have a local presence. Many popular file sharing sites for instance use unsecured domains from tiny Caribbean islands and are using them as a 'flag of convenience'. With this fragmentation, comes potential confusion and an environment in which cyber criminals can thrive."

Richard Lamb at Internet Corporation for Assigned Names and Numbers (ICANN): "It is now three and a half years since the root of the Domain Name System was signed, however our figures show there is still a great deal of work to do. DNSSEC is a leap forward in preventing attackers from redirecting end users to websites under their own control (for account and password collection). We urge the owners of the remaining unsigned TLDs to work with ICANN and help develop a safer web to protect the world's internet users."

Freed highlights the scale of the problem: "DNS cache poisoning continues to affect the world's Internet users. Towards the end of last year, users of Google's Malaysian domain (www.google.com.my) were directed to a fake website in Pakistan.[2] The Syrian Electronic Army (SEA) have also exploited DNS weaknesses to modify DNS entries and redirect users accessing The New York Times and Twitter to propaganda pages."

Freed notes: "Securing the TLD is a major first step but it's also necessary for responsible individual domain name owners to ensure the integrity of their zone data and hence the integrity of their associated web services by implementing a DNSSEC solution and signing their zone DNS resource records. A DNSSEC solution comprises a DNS Server with DNSSEC extensions and cryptographic keys."

DNSSEC uses public key cryptography to digitally sign DNS data. It means that responses to DNS queries are digitally signed by the DNS server using private keys and are automatically verified by the client using the corresponding public key.

Digital signing also guarantees the validity of DNS responses. As such Internet users are protected from the fraudulent DNS responses that could contribute to phishing techniques and other forms of fraud. Using a hardware secure module (HSM) can enhance the security of a DNSSEC solution. In addition to highly secure key generation and storage, HSMs provide fast cryptographic processing, which offload computationally intensive calculations from servers.

AEP Keyper is the only network-attached HSM on the market certified to FIPS 140-2 Level 4 overall, the highest FIPS accreditation.

For further information, please see: http://www.internetsociety.org/deploy360/dnssec/

[1] Figures published by Internet Corporation for Assigned Names and Numbers (ICANN) on 20.01.2014: http://stats.research.icann.org/dns/tld_report/index.html
[2] Source: MYNIC (official registrar of Malaysian internet domains): http://mynic.my/en/news.php?id=162

-Ends-

Notes to editors
On June 16, 2010, AEP Ultra Safe Key Security and Management product signed the DNS root of the internet, the dot, forming part of an elite international circle of trust protecting the web from being hijacked - See more at: http://www.ultra-aep.com/company-overview#sthash.G3DUZ1Q3.dpuf

About Ultra Electronics AEP
AEP provides trusted security everywhere and develops the highest grade security and communication technologies, securing data regardless of device, environment or location, tested and accredited to industry security standards, including FIPS 140-2 Level 4 and CAPS to IL3/IL4. Trusted by businesses, governments and the defence sector, its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient. AEP is a business unit of Ultra Electronics an internationally successful security, defence and aerospace company with a long, consistent track record of development and growth. Ultra businesses constantly innovate to create solutions to customer requirements that are different from, and better than competitors.

Enquiries
John Bailey, Marketing Manager 01628 642600
David Bell, Vocal Public Relations 07971 845740

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the abili...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
"As we've gone out into the public cloud we've seen that over time we may have lost a few things - we've lost control, we've given up cost to a certain extent, and then security, flexibility," explained Steve Conner, VP of Sales at Cloudistics,in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they responded to were some very unique security capabilities that we have," explained Mark Figley, Director of LinuxONE Offerings at IBM, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...