.DE strengthens security with 100,000 DNSSEC domain names



DENIC, the registry responsible for managing the .DE namespace, recently announced that 100,000 .DE domain names have been registered using the Domain Name System Security Extension (DNSSEC) .

DENIC introduced DNSSEC as an option for .DE domain names in 2011. According to the registry, the number of .DE domain names registered with this increased security has steadily increased since 2015.

DNSSEC was designed and implemented in response to security vulnerabilities inherent in the operation of the Domain Name System (DNS). Due to these inherent vulnerabilities, it is possible to hijack Internet users from their intended website destinations and redirect them to third party websites without their knowledge. This can lead to the spread of computer viruses, malware, and even the theft of sensitive financial and personal data.

DNSSEC seeks to remedy this situation by introducing additional security at the domain name server level, which ensures that Internet users are alerted to any possible redirection to a third-party site which is not their intended destination. DENIC introduced this additional layer of security to protect websites associated with .DE domain names from online attacks. These online attacks can take the form of “DNS spoofing” (where a hacker accesses domain name servers on which a domain name is hosted in order to redirect visitors to a website of their choice) or “DNS hacking” (where a hacker can modify the domain name server data to gain control).

Online attacks can also be used to attempt to obtain personal information from users, such as bank details. This type of fraudulent activity is not only a serious threat to users, but can also adversely affect the registrant and their online activity. Such fraudulent activity can lead to loss of income as well as loss of consumer confidence in the online activity in question. Thus, DNSSEC aims to build a “chain of trust” between users and the websites they visit.

To visit the DENIC website, please click here.


Previous Why the public domain name directory is about to disappear
Next Exposing public IP addresses of Tor services through SSL certificates

No Comment

Leave a reply

Your email address will not be published.