Blog Posts Tagged with "DDoS"

03b2ceb73723f8b53cd533e4fba898ee

DDoS Attacks: An Excuse to Talk About IPv6 Security

February 10, 2012 Added by:Pierluigi Paganini

The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Faction Hits Banks With DDoS Attacks

February 06, 2012 Added by:Headlines

A faction of the rogue Anonymous movement temporarily disrupted the online presence of several major banks with an onslaught of distributed denial of service (DDoS) attacks. Among the targets of the group identifying itself as Anonymous Brasil were Citibank and HSBC...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Looking Back: A Review of Threats Faced in 2011

February 02, 2012 Added by:Simon Heron

There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

All Out Cyber War: Analysis of the Middle-Eastern Conflict

January 29, 2012 Added by:Rafal Los

You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

US-CERT Warns of Denial-of-Service Malware Campaign

January 26, 2012 Added by:Headlines

US-CERT has received reports of attacks using malware-laden email attachments. The advisory comes one week after multiple DDoS attacks were launched against entertainment industry and US government websites by Anonymous supporters in an operation dubbed OpMegaupload...

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Anonymous Attacks, Dutch Cyber Strategy

January 24, 2012 Added by:Cyber Defense Weekly

Each attacker only has so much time and energy. It's like trying to get a crowd at a stadium to do the wave. As soon as the pitcher winds up on the mound the wave peters out. What should you do if you are the target of an Anonymous DDoS attack? Just wait, they will go away...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Shifting Digital Sands of Online Jihad

January 21, 2012 Added by:Infosec Island Admin

It seems that Anonymous has potentially sparked these guys to think like them and perhaps even use their tactics instead of continuing just to shake their fingers at us as they yell. This would be an interesting paradigm change in the global Salafi movement as well as the tactics of AQ...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

How to Avoid Being Miscast in a SOPA Opera

January 20, 2012 Added by:Kevin McAleavey

LOIC was originally written in C#, but a later variant was created in Javascript which permits it to be deployed from any internet connected device. LOIC and its JS variant are simple toys, but in the hands of enough people they can create a formidable DDOS attack on a site...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Take That Israel! All Your SCADA's Are Belong to Us!

January 20, 2012 Added by:Infosec Island Admin

The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Against Government and Entertainment Websites Escalate

January 19, 2012 Added by:Headlines

Multiple websites appear to be under DDoS attack, including the DoJ's http://justice.gov, the Recording Industry Association of America's http://riaa.com, and music publisher Universal Music's http://universalmusic.com...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

Ba829a6cb97f554ffb0272cd3d6c18a7

FBI Warns: GameOver

January 10, 2012 Added by:Kevin McAleavey

The significant part of the DDOS angle with the GameOver Zeus Trojan attack is that it serves as a diversion while the looting continues, and prevents access to mitigation with the bank until it's too late. That's what motivated the FBI to put out this alert...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Japanese Defense Ministry Developing Cyber Weapon

January 03, 2012 Added by:Headlines

"The program can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers...."

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Security Impact of Performance

December 22, 2011 Added by:Rafal Los

DDoS is being used as a tool that has turned poor performing systems into weapons against their implementers. It proves that no matter how big the pipe you have, it's possible to push so much traffic that the odds of handling it properly and staying available are virtually zero...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

OWWWS - The Other Form of Occupy

December 15, 2011 Added by:Rafal Los

If we we consider the Occupy movements across the globe, demonstrating and protesting against income inequality and inequitable policies around commerce and taxation, the persistent cart vulnerability could become a seemingly benign form of occupation that could develop into a serious threat...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »