- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn’t exist at the time. Meaning, they are continuously sending their Windows usernames and passwords to domain names they do not control and which are freely available for anyone to register. Here’s a look at one security researcher’s efforts to map and shrink the size of this insidious problem.
You must log in or # to comment.
Here’s a radical idea: quite making all these stupid full-word tld’s that nobody asked for.