The number of malware threats that receive instructions from attackers through DNS is expected to increase. Most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. Most malware-generated traffic that passes through these channels can be detected and blocked at the network level by firewalls or intrusion prevention systems. However, that’s not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow, at the conference.”]