The document discusses DNS rebinding attacks that compromise browser security by bypassing the same-origin policy, allowing attackers to exploit browser plug-ins and circumvent firewalls. It highlights the inadequacy of traditional defenses such as DNS pinning and proposes several robust defenses, including DNS resolvers and patches for plug-ins, to protect modern browsers from these vulnerabilities. The findings indicate that a significant percentage of web browsers are susceptible to such attacks, facilitating spam and fraud at low costs.