The Battery DDOS: Tip of An Iceberg

An interesting story brewing about the FBI investigating a DDOS (Distributed Denial of Service) attack on websites selling batteries. But the reporting does not go far enough: In fact, a little research reveals this is part of a much bigger assault on a range of industries. As a starting point, look at Elinor Mills of …

Continue reading ‘The Battery DDOS: Tip of An Iceberg’ »

Did Prolexic Fend Off Anonymous’s Sony Attacks?

Prolexic, a company that defends clients against Distributed Denial of Service (DDoS) attacks, says it has successfully combatted the “Largest Packet-Per-Second DDoS Attack Ever Documented in Asia”: “Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) mitigation services, today announced it successfully mitigated another major DDoS attack of unprecedented size in terms of packet-per-second …

Continue reading ‘Did Prolexic Fend Off Anonymous’s Sony Attacks?’ »

Some Early Lessons from The Georgian Cyberwar

illustration fron Arbor Networks There’s some interesting writing going about the Georgian Cyberwar. This from VNUnet, which seems to confirms my earlier suspicion that this was the first time we’re seeing two parallel wars:  “We are witnessing in this crisis the birth of true, operational cyber warfare,” said Eli Jellenc, manager of All-Source Intelligence at …

Continue reading ‘Some Early Lessons from The Georgian Cyberwar’ »

Drive Safely

This is probably the way to go with USB drives — security features that the user has to follow, or else the device won’t work.  Verbatim’s new Store ‘n’ Go Corporate Secure USB Drives’ mandatory security features safeguard all device contents with a complex password. Hack resistant feature locks down device after 10 failed logon …

Continue reading ‘Drive Safely’ »

Mapping Trends With Google

Google’s new Trends search is a lot of fun, and useful too. See how some things have taken off over the past couple of years, like Web 2.0: and Wikipedia (the lower graph is for volume of related pieces on Google News, the upper for ordinary Search): while others, such as WiMax, are more gradual: …

Continue reading ‘Mapping Trends With Google’ »

A Honeypot To Catch A Phisher

Netcraft. the British Internet security consultancy, highlight a new Honeynet Report on Traffic to Phishing Sites, showing that despite months of intensive anti-fraud education efforts by the banking industry a lot of people still click on through to fraudulent phishing sites: The study of phishing scams hosted on cracked web servers from The Honeynet Project …

Continue reading ‘A Honeypot To Catch A Phisher’ »

Fame At Last, Or Under Attack?

Here’s an example of how social engineering can be more important than technical sophistication. It’s an email with a credible from address, credible header, credible subject line, credible contents: From: john@flexiprint.co.uk Subject: Photo Approval Needed Hello, Your photograph was forwarded to us as part of an article we are publishing for our May edition of …

Continue reading ‘Fame At Last, Or Under Attack?’ »

Behind the Akamai DDoS Attack

A bit late (my apologies) but it’s interesting to look at the recent Distributed Denial of Service attack on Akamai, an Internet infrastructure provider. The attack blocked nearly all access to Apple Computer, Google, Microsoft and Yahoo’s Web sites for two hours on Tuesday by bringing down Akamai’s domain name system, or DNS, servers. These …

Continue reading ‘Behind the Akamai DDoS Attack’ »