Security Researcher Exposes Critical WHOIS Vulnerability

In Brief Benjamin Harris, CEO of watchTowrs, successfully manufacture fake HTTP certificates, tracked email activity, and execute code of his choice on thousands of servers for $20. He registered the domain dotmobregistry.net, which was previously the authoritative WHOIS server for .mobi. He observed the domain’s expiration and set up his own .mobi WHOIS server there, …

Software has holes, and hackers will exploit the new vulnerabilities that appear daily.

Introduction Access to information seeking processing software programs that provide functionality to allow you to be connected, productive, creative, and entertained are typically installed on devices. When an attacker discovers a vulnerability, the next step is to exploit it. This allows hackers to use these weaknesses for malevolent purposes. Vulnerability in most software is a …