Network Solutions has been hacked

TECHi's Author
Opposing Author News Read Source Article
Last Updated
TECHi's Take
Chastity Mansfield
Chastity Mansfield
  • Words 28
  • Estimated Read 1 min

It happens. In a world where hackers are almost always a step ahead of the security protocols designed to thwart them, no company of any size is safe.

News

News

  • Words 69
  • Estimated Read 1 min
Read Article

“It appears that several websites of Avira as well as other companies have been compromised by a group called KDMS. The websites of Avira have not been hacked, the attack happened at our Internet Service Provider ‘Network Solutions’,” Avira Security Expert and Product Manager Sorin Mustaca said in a mailed statement.

According to Mustaca, the DNS records of the impacted websites have been changed to point to arbitrary domains.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Softpedia

Rumor: Samsung plans to use Force Touch in the Galaxy S7
Rumor: Samsung plans to use Force Touch in the Galaxy S7

We still have a few months to go before Samsung releases the Galaxy S7, but there's been a surprising amount…

Pepsi’s first smartphone will be mid-range device called the Pepsi P1
Pepsi’s first smartphone will be mid-range device called the Pepsi P1

I'm sure most of you were quick to dismiss that rumor from a couple of days ago, the one out of…

Rumor: Xiaomi will unveil the Mi Note 2 on November 5th
Rumor: Xiaomi will unveil the Mi Note 2 on November 5th

The year is coming to an end and Xiaomi still hasn't released the two flagship smartphones that everyone has been…

The Tor Project has an ingenious plan to put exit nodes in libraries
The Tor Project has an ingenious plan to put exit nodes in libraries

In order for Tor to successfully anonymize its users, it has to bounce their traffic between a number of relays to obfuscate…