DNS Hack defeats Google
By IT-Observer Staff Monday, 9 May 2005 16:38 EST
Search engine giant Google was knocked out for 15 minutes over the weekend, due to what seems to be a possible DNS hack, according to investigation of Google engineers. All of Google services were inaccessible during the outage.
Google spokesman David Krane indicated that it was not a hacking issue, but rather a Domain Name Systems (DNS) issue which is treated as if someone would access one of the main servers and reassigning Google’s address to a third-party.
"Google's global properties were unavailable for a short period of time. We have remedied the problem and access to Google has been restored worldwide,” said Krane shortly after the event.
Paul Mutton of UK internet monitoring firm Netcraf, added that the nature of the outage suggests the DNS server operated by Google itself suffered a malfunction. According to Mutton, the local DNS server was unable to resolve the domain name google.com because Google’s DNS server was malfunctioning.
Though it does not seem to be a hacking issue, Google’s engineers are running an investigation to understand the reasons for the outage.
|
|
Prevent data theft & viruses through network connected USB sticks, PDAs & media players.
Control user access to endpoint connections with GFI EndPointSecurity - Free trial!
Visit GFI Security Software page for more information.
IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.
Latest News
SECUDE appoints Open-Source specialist as Linux Expert 02.11.06 SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.
Increased Spam Fuelled Through Botnet Activities 02.11.06 MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.
How to keep your VoIP net safe 30.10.06 One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.
User tricks, security treats 30.10.06 Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.
10 Steps to More Secure Wireless 27.10.06 We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.
BT acquires Counterpane Internet Security 25.10.06 BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.
Perdemia updates Permission Analyzer 25.10.06 Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.
Mac OS Bluetooth exploit - Inqtana.d 25.10.06 Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.
|
|