You may have heard of denial-of-service attacks launched against websites, but you can also be a victim of these attacks.Denial-of-service attacks can be difficult to distinguish from common network activity,but there are some indications that an attack is in progress.
What is a denial-of-service (DoS) attack?
The blacklist is maintained in the Windows registry and the Macintosh OS X FeatureLockdown file.On Windows, there are two blacklists, one for enterprise administrators,and one for Adobe patches and updates.
DNS Cache Poisoning Issue ("Kaminsky bug")
A weakness in the DNS protocol may enable the poisoning of caching recurive resolvers with spoofed data. DNSSEC is the only full solution. New versions of BIND provide increased resilience to the attack.
Cyber Espionage is the Real Problem
Dr. Jim Lewis sees the issue of economic cyber espionage as the greatest threat the United States currently faces in cyberspace.“The real problem is economic espionage,”
Lewis said today at an event hosted by the Potomac Officers Club.
Lewis is one of the premier experts in cybersecurity.He led the CSIS Commission on Securing Cyberspace for the 44th Presidency and has given testimony before Congress.
WASHINGTON -- The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown, the director of the National Security Agency has told Congress.
Lt. Gen. Keith Alexander, who is the Obama administration's nominee to take on additional duties as head of the new Cyber Command, also said the U.S. should not be deterred from taking action against countries such as Iran and North Korea just because they might launch a cyber attack.
"Even with the clear understanding that we could experience damage to our infrastructure, we must be prepared to fight through in the worst case scenario," Alexander said in a Senate document obtained by The Associated Press.
Symantec Corp. (Nasdaq: SYMC) and the NATO-accredited Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Estonia announced they have signed a memorandum of understanding to promote cooperation on the research of online threats.This joint research project will be based in Tallinn, Estonia, overseen by experts from both organisations.
All political and military conflicts now have a cyber dimension,whose size and impact are difficult to predict.National security experts must now acknowledge that real political and military objectives can be won or lost in cyberspace,even if only on the propaganda front.Globalisation and the Internet have aided foreign intelligence services and terrorists as much as any other part of society.
Old computers and mobile phones that people have thrown away to be re-used or recycled are often not thought of again by their owners, but in fact they still may have very sensitive personal data on them that can often be worth a lot more to criminals than the recyclable materials contained in the device.