How to Protect Against a Drive-by Pharming Attack
Just when you thought you were safe with your new home or small office router and firewall, you suffer a drive-by. But it's not a drive-by shooting--it's pharming, a different kind of threat.Drive-by pharming occurs when attackers create a Web page or e-mail that, when simply viewed, results in substantive configuration changes to a home broadband router or wireless access point. As a result, attackers gain complete control over the conduit by which the victim surfs the Web. While drive-by pharming has serious implications and could affect millions of users worldwide, this kind of attack can be easy to defend against at the router level. In this article we will discuss how such an attack works and how users can best protect themselves.
How drive-by pharming works
Dr. Ramzan's main interests include the practical and theoretical aspects of information security and cryptography. He has co-authored over 30 published research papers, over 15 patent applications and one book entitled "Crimeware: Understanding New Attacks and Defenses." Ramzan received his S.M. and Ph.D. degrees from the Massachusetts Institute of Technology in Electrical Engineering and Computer Science with his thesis research conducted in cryptography and information security. He can be reached at firstname.lastname@example.org.