If you haven’t heard about Dan Kaminsky’s DNS cache poisoning vulnerability, well, now you have. And while Dan had embargoed that information pending a coordinated update by all the major vendors to resolve the problem, apparently the exploit is alive in the wild. So anybody who’s running a nameserver out there, you need to flush your caches and update your machines immediately. No joke, you need to do this right now. Windows, Linux, OSX, IOS, doesn’t matter. An update is available, and if it’s not you can forward to OpenDNS, but get it done.