In the 41st episode of Team Cymru's 'The Who and Why Show', we review the current global distribution of infected machines around the world, revealing a few unexpected surprises and some clear winners and losers in the war against the Underground Economy.
In the 42nd episode of Team Cymru's 'The Who and Why Show', we begin a 4 part series on the basic elements of Distributed Denial of Service (DDoS) Attacks. In this first installment we discuss the motivations of the miscreants behind these attacks.
In the 43rd episode of Team Cymru's 'The Who and Why Show', we continue our 4 part series on the basic elements of Distributed Denial of Service (DDoS) Attacks. In this second installment we outline protocols and 3 of 7 different types of DDoS attacks
---Can't find episode 44---
In the 45th episode of Team Cymru's 'The Who and Why Show', we conclude our 4 part series on Distributed Denial of Service (DDoS) Attacks. In this final installment we outline some of the basic mitigation techniques that might help prevent or disrupt an attack.
Today we announce a significant addition to our bogon reference project. The new portions of the project are offered at no cost to the community, and the original bogon lists and feeds are not
being changed or canceled, just augmented.
Our new "fullbogon" feed includes prefixes allocated to RIRs, but not assigned by the RIRs to end-users, ISPs, etc, providing a more complete view of the unassigned space that should not be seen on the Internet.
This new service is therefore more granular than the original feed, including a wide variety of non-routable prefixes as well as unassigned prefixes and it also includes IPv6 prefixes.
Simply email email@example.com with your ASN, peering IP addresses and whether you use MD5 authentication.
See an overview in this weeks show, as well as a more basic overview in episode 12. For a more detailed explanation, see
Even more so than the original feed, there are significant changes to the list every day and the feed automatically recalculates the prefixes as they are allocated from the regional registries, so make
sure you are able to regularly update your lists.
In the 47th episode of Team Cymru's 'The Who and Why Show', we're joined by our Senior Software Engineer Tim Wilde who shares some tips on how to keep your hosted website secure.
This week Levi Gundert talks about a paper we're publishing this week, at:
We explore the recent surge in quality and availability of forged passports needed by denizens of the Underground Economy, to enable them to use e-money services to access their ill gotten gains.
Video 49 and 50 are missing.