Blog Posts Tagged with "DDoS"

69d16e51272491ef141d3e78da0bd2f0

Philippine - China Cyber War: Silic Leader Doxed and Frustrated

June 03, 2012 Added by:Jay Turla

A few weeks ago, busabos from the Anonymous #OccupyPhilippines defaced two government websites from China and posted the pictures and details of Wang Lei a.k.a y0c0 smart, the leader of the Silic Group Hacker Army and the admin of blackbap.com which is the forum site of Silic Group Hacker Army...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dominican Republic Central Electoral Board DDoS Attacks

May 30, 2012 Added by:Headlines

“Politically motivated DDoS attacks are increasingly common and are often timed to coincide with high profile events such as elections or executed in response to specific government actions. The key to minimizing disruption is being proactive and putting DDoS protection in place ahead of time...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Warns Companies of Anonymous DDoS Attacks

May 25, 2012 Added by:Headlines

The Cyber Division of the FBI warned several large corporations of the potential for DDoS and data exfiltration attacks scheduled for today, May 25. The attacks are being coordinated by the rogue movement Anonymous in an an exercise termed "Operation NewSon"...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Is Lord Sugar a Member of Anonymous?

May 18, 2012 Added by:Javvad Malik

I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Pirate Bay Labels DDoS Attacks as Censorship

May 09, 2012 Added by:Headlines

Critics of DDoS attacks conducted by movements like Anonymous have long held that it is hypocritical to profess the defense of free speech by engaging in a tactic that undermines one's right to freely communicate, whether the interest is sociopolitical or an effort to engage in commerce...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Google as a Cyber Weapon: New Attack Method Discovered

April 30, 2012 Added by:Pierluigi Paganini

The lesson learned is that it is possible to use Google as a cyber weapon to lauch a powerful "Denial of Money" attack against other platforms. In reality, the service in this case hasn't been interrupted, but the attack has made it extremely expensive to run...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers: GET OFF MY LAWN!

April 18, 2012 Added by:Infosec Island Admin

Do something constructive instead of destructive and inhibiting. You never know what you are stumbling about in. You could be ruining operations that lead to arrests or actionable intelligence. Think about it before you go all Charles Bronson and then a Pastebin dump about it...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

A Detailed Analysis of the DDoS Phenomena

April 16, 2012 Added by:Pierluigi Paganini

The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dirt Jumper DDoS Botnet Variants Continue to Proliferate

April 13, 2012 Added by:Headlines

“Development will continue, and there are increasing trends towards the development of attack techniques that will bypass certain types of anti-DDoS protection measures. The underground economy continues to flourish, and DDoS services are a piece of that rotten pie..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Vague Cybersecurity Legislation Threatens Civil Liberties

April 02, 2012 Added by:Electronic Frontier Foundation

Using cryptography to protect communications could be taken as a way to defeat an operational control. Measuring the performance of one's ISP or analyzing whether packets are being modified maliciously could all be seen as security threats under this definition...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FBI Issues Press Release on Anonymous - LulzSec Arrests

March 06, 2012 Added by:Headlines

Four Principal Members of “Anonymous” and “LulzSec” charged with computer hacking and fifth member pleads guilty; “AntiSec” member also charged with stealing confidential information from approximately 860,000 clients and subscribers of Stratfor...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IPv6 Protocol Implementation is Not a Security Panacea

February 22, 2012 Added by:Headlines

"The same thing that made the IPv6-enabled Internet valuable has also made it an increasingly valuable venue for attacks. While the frequency of attacks is relatively modest on IPv6 today, we expect that accelerated adoption will be followed in-kind by an accelerated pace of attacks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Stock Exchange Websites Disrupted by DDoS Attacks

February 15, 2012 Added by:Headlines

Websites operated by Nasdaq OMX, the Chicago Board Options exchange, and Bats Trading experienced disruptions due to a spate of distributed denial of service (DDoS) attacks conducted by a hacktivist group sympathetic to the Occupy Wall Street movement called L0NGwave99...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Commercial DDoS Tools Offer a Competitive Advantage

February 13, 2012 Added by:Headlines

With the growing availability of DDoS services being marketed directly to businesses, enterprises may increasingly find themselves under attack from competitors seeking to gain an advantage in the increasingly lucrative Internet marketplace...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security and the Battle Over Productivity

February 11, 2012 Added by:Rafal Los

The trick is, when security can't clearly and absolutely get definition on what employees should and shouldn't be allowed to do, they have to implement the law of least privilege overly aggressively and then things get slow, tedious, and everyone complains about security...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »