Thursday, March 28, 2024

Quad9 – Free DNS Platform to Protect Users From Malware and Phishing Sites

Quad9 a free DNS security solution that uses to protect users against most common cyber threats and their privacy.

It keeps blocking you against known malicious domains and prevents your computer and IoT devices from connecting to malware or phishing sites.

Quad9 created in collaboration with IBM Security, Packet Clearing House and the Global Cyber Alliance (GCA), intend to provide users an added privacy and security protection as they across the internet.

Threat intelligence

It checks the website with IBM X-Force threat intelligence database which consists of 40 Million analyzed web pages and images. Also, it feeds on 18 additional threat intelligence sources.

Also Read: Email Header Analysis – Received Email is Genuine or Spoofed

All of these sources combined into threat mitigation feed gives a vast database to Quad9, which makes it to act rapidly in case of risks emerge.

How Does it work

To use Quad9 DNS service change your computer preferred DNS server to 9.9.9.9, then your request will be routed through Quad9 DNS instead of your ISP default DNS.

It has an inbuilt threat intelligence if it detects malware or other infection in the domains you enter it blocks from accessing it.

Quad9 says IP addresses of end users are not stored to disk or distributed outside of the equipment answering the query in the local data center. Quad9 is a nonprofit organization dedicated only to the operation of DNS services. There are no other secondary revenue streams for personally-identifiable data, and the core charter of the organization is to provide secure, fast, private DNS.

Performance

Servers distributed worldwide and they are placed primary at Internet exchange points, so it reduces the time and distance better than any other solutions.

At launch severs they placed servers at 70 locations, more than 160 locations scheduled on 2018 and the systems are anycast which automatically routes to the closest operational system.

To Setup on Windows

To Setup on Mac

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles