Top 4 Tips to Fight Off Botnet Denial of Service Attacks In case you haven’t been paying attention Botnet DDoS attacks passed the 40 Gigabits/sec mark in 2008 according to Arbor Networks. The shear size of today’s Botnets has reached into the mind-boggling realm of 1.9 million bots in a single Botnet. Couple that with the fact that Botnet DDoS attacks are one of the hardest assaults to defend against and you have a real nightmare scenario on your hands. This is why DDoS attacks are the most common method employed by extortionists to attempt to hold online merchants hostage for ransom. It's big business for criminals and business is good. Obama's cybersecurity chief to be a 'coordinator' not 'czar' In a speech at the White House last week, President Obama put forward his vision for protecting the nation’s critical IT infrastructure from attack, and announced the new office of Cyber Security Coordinator. Microsoft warns of DirectX attack Microsoft warns of DirectX attack on XP, WS2003 in the wild Microsoft Subnet reports about the three vulnerabilities of Microsoft software and the workarounds until the patch is installed. Turns out data breaches are older than manned flight What's the oldest data-loss incident on record involving social security numbers? How about health-care industry records? Well, there's no way to know for certain, but the Open Security Foundation's DataLossDB has just concluded a six-week contest that invited amateur sleuths to submit the oldest such loss incidents they could find. The results were announced this morning on the organization's blog. Dr. Johnston's Security Maxims: Sense and Humor Having graduate students is like having a thousand sets of eyes and ears: they are always noticing neat stuff and sending pointers that stimulate thought or – as often – cause delighted laughter. Jan Buitron, CISSP, MCSE, ITIL Foundations Certified, Network +, who last appeared in this newsletter in a series of columns in September 2008, sent me a reference to a hilarious and valuable compilation of security maxims by Dr. Roger G. Johnston, PhD, CPP, Section Manager of the Vulnerability Assessments Section in the National Security and Non-proliferation Department of the Argonne National Laboratory. |
No comments:
Post a Comment