It’s shocking: hundreds – if not thousands – of domain names often have their DNS settings ‘poisoned’.
Hackers able to edit DNS zones create new third-level domains (subdomains), to be used for spamming and phishing.
An article detailing the practice lists a large number of such active examples, showing how viagra and other substance-peddling web sites go live after legitimate, active domains fall prey to DNS poisoning.
How about giving examples?
How about clicking on that link? 😉
I get a malicious warning when I click on that link
Good one Owen 🙂 It’s an .edu domain, no warnings on my end.
It is a phishing link that will cause widespread virus attack
Ok, jokes aside that’s where the article resides. I’m not pasting it here.