Operation Ghost Click DNS servers to shut down in March
Source: CNET - Posted by Dave Wreski   
Intrusion Detection One of the more widespread malware efforts over the past few years was the DNSChanger scam, which installed a Trojan horse that would change the DNS server settings on affected computers to divert traffic to rogue servers. The DNS system is essentially the Internet's phone book that allows your computer to resolve a URL to the IP address of the server that hosts its contents. By changing a computer so that it uses a rogue DNS server, the DNSChanger malware was thus able to redirect valid URLs (such as those for banking institutions) to malicious Web sites in order to steal personal information.

Read this full article at CNET

Only registered users can write comments.
Please login or register.

Powered by AkoComment!