It's serious, but probably not quite as serious as you think.
In ultra simple terms, if you type in www.forumophilia.com on your browser, your browser asks your ISP's nameserver what the IP address for that is. If that nameserver hasn't seen one of those requests recently, it then goes out and asks the authoritative source for that IP address, so it can tell you. It then stores this answer in a cache for a while (usually a few hours to a week or two) so it doesn't have to go looking the next time you ask.
The attack is to slam the nameserver with a few thousand forged responses at exactly the same time that it goes looking. If one of those forged responses is built by chance in exactly the same way that the nameserver is expecting, it will take that answer over the real one, and start redirecting traffic from www.forumophilia.com to someone else's server until the maximum storage time runs out on the entry.
There are a lot of technical ways to make this attack a lot harder than it already is, so I don't expect a lot of exploits to actually make the news.