• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Microsoft Corp. Finally Buys “Corp.com” To Save People’s Asses

by Cyber360 News
April 8, 2020
in Security
0
Microsoft Corp. Finally Buys “Corp.com” To Save People’s Asses
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

According to a report by Krebs On Security, Microsoft is buying the old domain name “Corp.com” in an attempt to boost the security of the users.

For over 26 years, the domain was owned by Mike O’Conner, who held an auction for the same in February with an opening bid of $1.7 million.

O’Conner confirmed that Microsoft has agreed upon the deal but didn’t reveal the amount of purchase or made any further comments. He wanted Microsoft to get hold of Corp.com since he hasn’t been able to do much with it all these years.

Interestingly, O’Conner was an early adopter of the internet. He didn’t waste time in purchasing domains such as television.com, bar.com, pub.com, place.com, etc. He has sold some of these over the years.

Why is Corp.com a security threat?

Corp.com has been in question for a long time as it poses security risks for Windows-powered machines deployed in corporate networks. A Windows feature called DNS name devolution works alongside the Active Directory service and allows PCs connected to a corporate network to be easily identified.

The problem lies in the fact that older Windows versions (like Windows Server 2000) used “Corp” as the default path for the Active Directory, which in turn, created all the chaos.

Various organizations didn’t care to change it and continued building their infrastructure on top of it. Little did they know that it would turn into a security threat one day.

Now, the story is all good until an employee is working inside the organization. But the problem occurs when their machine goes out in the open, for instance, a coffee shop, and tries to connect to the Corp domain.

What happens here is called ‘namespace collision,’ as the default domain Corp overlaps with Corp.com which is present on the open internet. This, in turn, would lead the confused machine into sending sensitive data to Corp.com because of the way things work.

So, whoever owns Corp.com can check out the stuff and maybe do evil deeds if they’re a bad person. Thankfully, O’Conner isn’t one of them.

javascript bundle 340x296 square banner (1)

One thing to note here is that the feature was designed at a time when people mostly used heavy desktop machines in their offices. Taking their computer out for a picnic was the last thing they could imagine.

A lot of testing has been done over the years, revealing that Corp.com receives a concerning amount of love from Windows machines across the globe. Back in 2019, security researcher Jeff Schmidt analyzed the domain for eight months and concluded that over 375,000 Windows PCs tried to connect to the domain and send data.

Microsoft has finally bought Corp.com

Microsoft acknowledged this problem back in 2009 and released a couple of patches to fix it. But the ballooning size of the corporate networks made the affected organizations reluctant in deploying the patches.

It required them to make their Active Directory network offline for a while, and there were chances that the patches would likely break a couple of important applications. Hence, not deploying the patches was considered safer after weighing the risks involved.

Over the years, Microsoft continued to release software updates to make things better. Now, the Windows-maker has taken the Corp.com domain in its own hands and hopefully solved the problem once and for all.

However, the company has a history of abandoning unused domains. Let’s see, for now how long it pays attention to this one.

Cyber360 News

Cyber360 News

Next Post
NSO CEO claims Facebook wanted NSO surveillance tool to spy on users

NSO CEO claims Facebook wanted NSO surveillance tool to spy on users

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In