You are here: IT-Observer » Articles » Editorial RSS | White Papers |

DNS Hack defeats Google





Search engine giant Google was knocked out for 15 minutes over the weekend, due to what seems to be a possible DNS hack, according to investigation of Google engineers. All of Google services were inaccessible during the outage.

Google spokesman David Krane indicated that it was not a hacking issue, but rather a Domain Name Systems (DNS) issue which is treated as if someone would access one of the main servers and reassigning Google’s address to a third-party.

"Google's global properties were unavailable for a short period of time. We have remedied the problem and access to Google has been restored worldwide,” said Krane shortly after the event.

Paul Mutton of UK internet monitoring firm Netcraf, added that the nature of the outage suggests the DNS server operated by Google itself suffered a malfunction. According to Mutton, the local DNS server was unable to resolve the domain name google.com because Google’s DNS server was malfunctioning.

Though it does not seem to be a hacking issue, Google’s engineers are running an investigation to understand the reasons for the outage.



Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.

Latest News

SECUDE appoints Open-Source specialist as Linux Expert
02.11.06  SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.

Increased Spam Fuelled Through Botnet Activities
02.11.06  MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.

How to keep your VoIP net safe
30.10.06  One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.

User tricks, security treats
30.10.06  Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.

10 Steps to More Secure Wireless
27.10.06  We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.

BT acquires Counterpane Internet Security
25.10.06  BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.

Perdemia updates Permission Analyzer
25.10.06  Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.

Mac OS Bluetooth exploit - Inqtana.d
25.10.06  Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Copyright © IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us
Site Meter