Thursday, February 13, 2025
HomeComputer Security8.8.8.8 - Google Public DNS now Support DNS-over-TLS to Protect Customer Search...

8.8.8.8 – Google Public DNS now Support DNS-over-TLS to Protect Customer Search Queries

Published on

SIEM as a Service

Follow Us on Google News

Google Public DNS (8.8.8.8) now officially supports DNS-over-TLS that provides complete privacy for users and their search queries between their devices and Google Public DNS.

DNS allows to convert Internet domain names like www.gbhackers.com into IP addresses, in this case, un protect users queries exposed the sensitive information.

New Implementation of DNS-over-TLS now supports Google Public DNS that helps users to perform a secure query and it will be completely transmitted via the encrypted channel.

Google Public DNS  launched almost 8 years ago Since then Google now implemented DNS-over-TLS protocol mission in order to provide better privacy and security.

This will completely improve the privacy and security between clients and resolvers that protect from eavesdropping and spoofing attacks.

Traditional DNS queries and responses are sent over UDP or TCP without encryption which is vulnerable to eavesdropping and spoofing but this new
 Google Public DNS over TLS-encrypted TCP connections as specified by RFC 7858

So users now can secure their connections to Google Public DNS with TLS, the same technology that protects their HTTPS web connections.

According to Google, “We implemented the DNS-over-TLS specification along with the RFC 7766 recommendations to minimize the overhead of using TLS. These include support for TLS 1.3 (for faster connections and improved security), TCP fast open, and pipelining of multiple queries and out-of-order responses over a single connection. “

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read: Cloudflare Announced Internet’s Fastest DNS Service 1.1.1.1 that Extremely Focus on Consumer Privacy

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

Google has released an urgent update for its Chrome browser to address a critical...

Google Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

Google's Safe Browsing technology now ensures enhanced protection for over 1 billion Chrome users...

Hackers Exploiting Google Tag Managers to Steal Credit Card from eCommerce Sites

In a concerning development, cybercriminals are leveraging Google Tag Manager (GTM), a legitimate tool...