It also sounds like you've been "Fox Newsed" in a way. Maybe not by Fox directly, but with their tactics. You take a humdrum topic, or even something that people need only be aware of, and then spin it in Chicken Little (THE SKY IS FALLING!!!) style. The result is panic, outrage, confusion, etc -- exactly where these people want you. Don't fall for it.
DNS exploits have been around for at least a decade now. Most target the HOSTS file on a computer, while others go after network card settings. One of the more annoying malwares in recent years has been the "Google redirect" problem, where browser profiles have been exploited. Firefox was the one most commonly targeted.
At the server level, DNS poisoning was a big issue back in 2007-2008.
DNS is still a very vulnerable system, due to the non-implementation of DNSSEC (secure DNS). If you read any of the details on why developers disliked SOPA (and all the other various BS House/Senate bills aimed at so-called "anti-piracy"), one of the biggest problems was that it made DNS more vulnerable in the process, and would have prevented DNSSEC in the future.
This DCWG.org site is owned by an individual, and not a security company. As such, take its advice as the advice of a single person, and not as that of an authoritative body. Furthermore, several of the sites appear to be owned by a non-entity named "Vixie Freehold". It may just be a group of self-proclaimed internet police/experts, as opposed to a verifiable qualified organization.
A malware from 2010 (Alureon) -- long ago accounted for by 2012 anti-malware protection software -- is claimed to be responsible.
As far as I'm concerned, the website is nothing more than a farce.
In terms of actual security...
SuperAntiSpyware is okay, Avast is okay. Note that I've written "okay" -- not excellent.
If you want current excellent software, there's three that I would suggest for Windows home/office computers:
My personal laptop uses
MalwareBytes Pro ($25) with Comodo Personal Firewall (freeware).
And I've been using Endpoint Protection on the local network workstations and the localnet server, which helps prevent malware from "system hopping", should one of them become infected.
For Mac, look at
Kaspersky or Sophos. (Note that Sophos has a basic free edition, too!)