LinkedIn is recovering from a DNS issue that sent visitors to a different web site for an hour Wednesday night.
The issue, which is now resolved for most users, rerouted the traffic to a domain sales page.
LinkedIn, a popular professional social network, acknowledged the issue in a tweet, but did not elaborate.
LinkedIn is recovering from a DNS issue that sent visitors to a different web site for an hour Wednesday night.
The issue, which is now resolved for most users, rerouted the traffic to a domain sales page.
LinkedIn, a popular professional social network, acknowledged the issue in a tweet, but did not elaborate.
LinkedIn is recovering from a DNS issue that sent visitors to a different web site for an hour Wednesday night.
The issue, which is now resolved for most users, rerouted the traffic to a domain sales page.
LinkedIn, a popular professional social network, acknowledged the issue in a tweet, but did not elaborate.
However, App.net co-founder Bryan Berg claims there's more to the issue.
"LinkedIn just got DNS hijacked, and for the last hour or so, all of your traffic has been sent to a network hosted by this company [confluence-networks.com]. And they don't require SSL, so if you tried to visit, your browser sent your long-lived session cookies in plaintext," Berg wrote.
If he is correct, it's possible that user cookies were captured in plaintext by a third party that could use them to compromise LinkedIn accounts.
LinkedIn has had its share of security problems in June 2012, when 6.5 million encrypted passwords were leaked online.
LinkedIn did not immediately respond to a request for comment. We will update the story as we get more details.