Skip to content

Understanding DNS Blocking: How it Works

Understanding DNS Blocking: How it Works

DNS blocking is a crucial feature for any organization looking to safeguard its network and users against various online threats. It involves preventing access to specific websites or online resources by blocking their domain names using the Domain Name System (DNS).

How Does DNS Blocking Work?

Well, when a user types a website’s URL into their web browser, the request is sent to a DNS server to resolve the domain name into an IP address. DNS blocking works by intercepting this request and checking the domain name against a predefined blocklist or denylist. If the domain name is found on the blocklist, the DNS server responds with a blocked message instead of the IP address, preventing the user from accessing the website.

What Happens if a Website is on Both the Allow and Denylist?

It’s important to note that if a website is on the denylist, it cannot be added to the Allowlist, and vice versa. This is because the two lists work in opposite directions, with one blocking access and the other allowing it. Additionally, if a website you are trying to add to either list is already blocked by an AppBlocker, you will receive an error message. In this case, you will need to remove the site from the AppBlocker’s blocklist before adding it to the desired list.

How to Check if a Website is Blocked?

If you’re unsure whether a website is blocked, there is a way to check it by using the nslookup command in the command prompt. If the website is blocked, nslookup will respond with the IP address of the block page. On the other hand, if the website is not blocked, nslookup will respond with the actual IP address of the website. For more detailed instructions, check out our article.

However, keep in mind that it may take 5-7 minutes for the DNS cache to update and the blocking to take effect.

In conclusion, DNS blocking is an effective way to protect your network and users from online threats. By blocking specific domain names, you can prevent access to malicious websites, adult content, and other unwanted online resources. And with the right configuration, you can ensure that your users have access to the websites they need while blocking those they don’t.


Start using SafeDNS for free

Take advantage of the SafeDNS trial period and try all the best features

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

5G and IoT: Opportunities, Challenges, & the Road Ahead

5G and IoT

The convergence of 5G technology and the Internet of Things (IoT) is poised to reshape the digital landscape, offering unprecedented opportunities for businesses and consumers alike.

As 5G networks roll out, they will provide the necessary infrastructure for IoT devices to communicate faster and more efficiently, enabling a new era of connectivity and innovation. Moreover, the integration of 5G technology is expected to boost the development of Industry 4.0, revolutionizing manufacturing processes and supply chain management through increased automation and data exchange. 

IoT in the 5G Era

According to a GSMA report, 5G technology will play a critical role in the growth of IoT, supporting a diverse range of applications across various industries. With higher bandwidth, ultra-low latency, and improved reliability, 5G networks will enable IoT devices to handle more data and perform more complex tasks, paving the way for innovations in areas such as autonomous vehicles, smart cities, and telemedicine. The integration of both technologies will also significantly impact the agricultural sector, helping to optimize resource management while enhancing sustainable practices.

5G’s Impact on IoT Development & Implementation 

5G holds transformative potential for IoT development and implementation. With faster connection speeds, lower latency, and enhanced reliability, 5G networks can support a wide range of IoT use cases that were previously impossible to achieve. This includes enabling real-time remote control of complex machinery, supporting massive IoT deployments in industrial settings, and facilitating large-scale data processing for predictive analytics.

IoT Security in the Age of 5G

Alongside opportunity and innovation admittedly comes new challenges with IoT security. The increased connectivity and data transmission capabilities of 5G networks may expose IoT devices to new security vulnerabilities and cyber threats. To address these concerns, businesses must prioritize security measures, such as encryption, authentication, and regular software updates, to protect their IoT devices and the sensitive data they generate.

Moreover, 5G network providers should adopt a proactive approach to security, implementing advanced threat detection and mitigation strategies to safeguard their networks from cyberattacks. Collaboration between network providers, device manufacturers, and other stakeholders is also essential to ensure a comprehensive and robust approach to IoT security in the 5G era.

Final Thoughts

IoT and 5G present a wealth of opportunities for businesses and consumers, driving innovation across various industries and transforming the way we live and work. By harnessing the power of 5G networks, IoT devices can achieve unprecedented levels of connectivity and efficiency, enabling a new era of digital innovation.

However, as we embrace the benefits, it is crucial to remain vigilant about the security challenges that may arise. By prioritizing IoT security and adopting a collaborative approach to protecting networks and devices, businesses and network providers can unlock the full potential of this powerful convergence while ensuring the safety and privacy of their data.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Unpacking the Recent Oakland Ransomware Attack

Today, we’re here to talk about the recent ransomware attack that hit Oakland, California. Now, before you start to panic, let’s break down what happened and what it means for the city.

First things first: what is ransomware? Essentially, it’s a type of malware that hackers use to gain control of a computer system or network. Once they have control, they encrypt all of the data on that system and demand a ransom in exchange for the decryption key. In other words, they hold your data hostage until you pay up.

About the Oakland Ransomware Attack

Now, let’s get back to Oakland. On April 27th, the city of Oakland announced that they had been hit with a ransomware attack. The attack affected the city’s email systems, phone lines, and some of its websites. The city’s emergency services were not affected, but the attack did cause significant disruptions to non-emergency services.

The ransom demand was not disclosed, but the city did say that they would not be paying it. Instead, they are working with law enforcement and cybersecurity experts to investigate the attack and restore their systems. The city has also urged residents to be cautious of potential scams and phishing attempts that may arise as a result of the attack.

Could NAC Have Stopped the Oakland Ransomware Attack?

While network access control (NAC) is not a silver bullet that can prevent all cyber attacks, it can be an effective tool in deterring certain types of attacks, including ransomware attacks like the one that hit Oakland.

With NAC, organizations can require that devices connecting to their network meet certain security standards, such as having up-to-date anti-virus software or not being known to be infected with malware. This can help prevent infected devices from accessing the network and spreading the ransomware to other systems.

In the case of the Oakland ransomware attack, it’s possible that NAC could have helped prevent the attack or at least minimize its impact. By enforcing security policies and requiring that all devices connecting to the network meet certain security standards, the city could have made it more difficult for the attackers to gain access to their systems.

Of course, it’s impossible to say for sure whether NAC would have prevented the attack in this specific case. Cybercriminals are constantly developing new tactics and techniques to bypass security measures, and there is always a risk that they will find a way to infiltrate even the most secure networks.

That said, NAC can still be a valuable tool in deterring cyber attacks and minimizing their impact. By implementing NAC alongside other security measures, organizations can create a layered defense that makes it much more difficult for attackers to gain access to their networks and data.

While the full impact of the attack is still being assessed, it serves as a reminder that ransomware attacks are a real threat to organizations of all sizes. In fact, the number of reported ransomware attacks has been on the rise in recent years. Cybercriminals are constantly looking for new ways to exploit vulnerabilities in computer systems and networks, and it’s up to organizations to take the necessary steps to protect themselves.

What Can You Do to Prevent these Sorts of Attacks?

So, what can you do to protect your organization from a ransomware attack? Here are a few tips:

  • Keep your software up to date: Make sure that you’re running the latest versions of all software on your computer or device. Updates often include security patches that can help protect you from known vulnerabilities.
  • Be cautious of suspicious emails: Phishing emails are a common way for cybercriminals to spread malware. Be wary of emails from unknown senders, and never click on links or download attachments unless you’re sure they’re legitimate.
  • Back up your data: Regularly back up your important files to an external hard drive or cloud storage service. This way, if you do fall victim to a ransomware attack, you’ll still have access to your data.

Overall, the Oakland ransomware attack serves as a reminder of the importance of cybersecurity. While it can be easy to think that it won’t happen to you, the reality is that anyone can fall victim to a cyber attack. By taking the necessary precautions, you can help protect yourself and your organization from the devastating effects of a ransomware attack.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

5 key business apps for startup success in 2023

Starting a business is in itself a daunting task, but keeping it successful on top of that requires immense effort and skill. A tight budget and so many choices when it comes to managing said business can take a toll on any startup. Moreover, a huge part of maintaining that success is having the right tools. 

Woman sits on sofa and uses her smartphone with a smile on her face.Nowadays, enterprise applications and software play a vital role when it comes to having a flourishing business as they help keep organizational and scaling headaches to a minimum. From office management to cybersecurity solutions, we’ve compiled a list of apps that will take your startup to the next level!

Flanco – for your office and property management

Flanco introduces itself as “the future of workspace” – and for good reason! It’s an office app that helps manage desk space and workplace resources. Need to easily book a desk or meeting room? Flanco has got you covered. Need to know which meeting rooms are booked in real time? Flanco comes to the rescue once again. Not to mention that the app itself has an intuitive interface and is fairly simple to use. For startups, it’s an all-in-one property manager. Effortlessly manage assets, accounting, vendor contracts, parking – Flanco has it all.

Slack – for your organizational communications

Slack is definitely king when it comes to communicating with the team, and doing so quickly and efficiently. A rock-solid communication platform will always be a crucial cog in the successful startup, especially when so many things are discussed on the go. Message people directly, create project-focused channels, or break into smaller chats to share key information with relevant stakeholders. Slack has searchable history and numerous app integrations that just make the job easier. In addition, you can set up reminders, add team members in the middle of conversations to keep them in the loop, and that’s only the tip of the iceberg when it comes to this app.

NordLayer – for your business privacy and security

Business cybersecurity is a must, period. In this day and age, when it comes to protecting your assets, customers, and team, there can be no shortcuts. Having your business fortified is essential – and NordLayer does just that and more. A robust network access security tool, it has numerous useful features like shared gateways for employees, DNS filtering, and other tricks to keep you secure. NordLayer will ensure that your company’s resources are protected and employees can securely access their work from anywhere. Furthermore, it offers a centralized control panel for convenient payment, features, and user management. Already have an existing company infrastructure? No worries, NordLayer can be easily integrated into Azure, Google Workspace, AWS and more.

Notion – for your docs and project management

Project management is no easy task, especially when there are multiple projects, deadlines and stakeholders involved. Want to keep track of the status of your project? Need to know what’s already been done? Notion is the tool you need. It’s useful for keeping tasks in order, and having workflows, docs, and guidelines in one place. You can create your own Wiki, and Notion even helps with building roadmaps and planning sprints. It’s a great tool for a neat and uncomplicated visual workflow in general. Another excellent feature is the ability to integrate it with Jira, Slack, Google Drive, and other apps for a truly seamless workflow.

Hootsuite – for your social media management

Let’s face it, competition is everywhere. If you’re running a business, social media is a tried-and-trusted approach to being seen, heard, and having a place under the sun. Social media is important for numerous reasons – increasing brand awareness, receiving direct feedback, customer engagement, and posting relevant content. However, managing multiple social media accounts can be a bit of a hassle. This is where Hootsuite comes in. This tool helps to schedule and publish content, monitor trends, and understand your audience. Everything can be done from a single handy dashboard, saving you precious time and resources.

Just the tip of the iceberg

This apps list for startups only scratches the surface of the myriad of possibilities out there. Depending on the category and profile of your business, there are dozens if not hundreds of apps and tools that could help you raise and maintain a successful business. These are just a few of what we think would be a good base to start out with, as they cover the most fundamental of needs. As mentioned previously, having the right tools can immensely help to stay on track, meet your goals, and simply be better organized – this is what tools are made for!


5 business apps for startup success in 2023

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Dumpster diving application memory

Penetration testers hunt for weak spots in applications so vulnerabilities can be fixed before bad actors find them. One way to find those weak spots is to inspect application memory to see if sensitive data is being stored in a way that hackers can access. In this article, we’ll explain how pen testers use the memory inspection process to strengthen app security.

What is memory inspection? Applications have memories — data that is generated from application processes is then stored within the app’s files, either on a device or in the cloud. If an app hasn’t been set up securely, a hacker could dive into those files and retrieve sensitive data.

White hat hackers — the people who hunt for vulnerabilities so they can be patched — can also use these same methods for good. By searching through the memories of mobile and desktop apps, as well as inspecting the installer file contents, they can unearth potential risks and keep users safe.

Dumping the memory

The first step in the inspection process is extracting the memory from an application. This is easily done on a Windows OS — we just open the task manager and create a dump file. On a Unix operating system, the relevant information is kept in /proc/<PID>/mem and /proc/<PID>/maps.

MacOS, on the other hand, requires us to boot into recovery mode and disable System Integrity Protection. This feature protects processes from being modified or tampered with. Having done this, we can then make a process dump.

Memory dumping gets a bit trickier when we approach mobile applications. Mobile devices usually require root privileges in order to extract the contents from an app’s memory with the help of the Frida tool.

After this step, we should be left with a “.txt” or a “.dmp” file which contains the extracted memory. It is a good idea to run this file through the “strings” utility to filter human-readable strings of a particular length because the dump might contain non-ASCII characters.

Searching for secrets

Once we have dumped the memory, we can start working with what we have. Primarily, we are now searching for information that reveals the following:

  • Session identification values

  • Access tokens

  • Service account credentials

  • Personally identifiable information

  • Authentication passwords

  • Database connection strings

  • Encryption keys and other master secrets

  • Data of a higher security classification than the logging system is allowed to store

  • Commercially sensitive information

  • Information that is illegal to collect in the relevant jurisdictions

  • Information a user has opted out of collection, or not consented to

The sensitive information listed above could be used by malicious actors for their own benefit. If this information is available through memory inspection, that’s a problem that needs to be fixed.

It would also be a good idea to use automated scripts that are able to pick out various access tokens, API keys, and any other values. For example, the following regex rule can be used to find AWS keys:

((‘|\”)((?:ASIA|AKIA|AROA|AIDA)([A-Z0-7]{16}))(‘|\”).*?(\n^.*?){0,4}((‘|\”)[a-zA-Z0-9+/]{40}(‘|\”))+|(‘|\”)[a-zA-Z0-9+/]{40}(‘|\”).*?(\n^.*?){0,3}(‘|\”)((?:ASIA|AKIA|AROA|AIDA)([A-Z0-7]{16}))(‘|\”))+

Source: I scanned every package on PyPi and found 57 live AWS keys | Tom Forbes

Understanding the risks

With many applications now storing data and running processes in the cloud, the risks posed by hackers who dumpster dive app memory are even greater. If bad actors can find service account credentials, Google API keys, and Firebase URLs in the dump, they could use these to their advantage.

Usually, service account credentials are used to retrieve an application’s remote configuration. If an attacker gets hold of valid credentials to access cloud systems that are improperly configured, no amount of firewalls can keep them from accessing the computing, network, and storage assets in that cloud environment.

It should be noted, however, that leaving account keys in the memory is not a problem as long as the IAM is configured correctly and the principle of least privilege is applied.

A penetration tester should pay close attention to the scope of tokens left in app memory as well as privileges to service accounts, both of which can be as dangerous as the exposed service account credentials.

Even if we do not find any security vulnerabilities, memory inspection is still worthwhile. We might discover unused tokens or accounts that are no longer needed, and deleting these can cut costs in addition to reducing security risks.

Fixing the vulnerabilities

The purpose of memory inspection is to find possible vulnerabilities and sensitive data that might be exposed. Afterwards, such vulnerabilities have to be fixed.

The principle of least privilege should be applied when resolving memory issues. Keep only absolutely necessary data and throw out everything else. This is a simple concept that will limit the potential for you to disclose sensitive information.

Checking application memory may be considered low hanging fruit in the cybersecurity world. However, any information stored or processed in a client’s memory is available to administrators and should be regularly checked from the vendor’s side.

We all make mistakes, and it is useful to carry out an inspection periodically. Doing so not only helps us to find and fix the errors but also deepens our understanding of the application’s inner workings.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×