Industry News Listing

We are constantly in touch with industry developments in our core competemce areas: High-Load Solutions, Content Delivery & DDoS Protection.

We have taken the liberty to put together this regularly updated news listing to help keep you informed. Enjoy!

Don't see your news in our list?
Go ahead. Tell us about it.

DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors
- Ellen Messmer
27 January 2010
Read Full Story on Network World
Massive denial-of-service attacks and "stealthy infiltration" of corporate networks by attackers is a common experience for companies in critical infrastructure sectors, including financial services, energy, water, transportation and telecom, according to a new survey. Quiz: Separate cyber security fact from fiction Extortion schemes related to distributed DoS attacks are also rampant, especially in some parts of the world, according to the survey.
Chinese human rights Web sites suffer attacks
- Stephen Shankland
24 January 2010
Read Full Story on CNet News
The sites of Chinese Human Rights Defenders and four related groups were targeted by cyberattacks over the weekend, the organization said Monday. A distributed denial of service (DDOS) attack paralyzed the Chinese Human Rights Defenders site for about 16 hours on Saturday and Sunday, the organization said. Also attacked were Civil Rights and Livelihood Watch, Independent Chinese Pen Center, New Century News, and Canyu, the group said.
DDoS attacks on the increase, McAfee report warns
- Warwick Ashford
01 November 2009
Read Full Story on Computer Weekly
Distributed denial of service (DDoS) attacks are increasingly popular with cybercriminals, security researchers have revealed. This trend is being driven by the ready availability of DDoS services in the underground economy, according to latest threat report from security firm McAfee. These services are making it easier to carry out DDoS attacks by offering thousands of hijacked computers for attacking websites to the highest bidder.
DDOS Attacks Crush Twitter, Hobble Facebook
- Michael Arrington
05 August 2009
Read Full Story on TechCrunch
A DDOS attack this morning took Twitter out at the knees and they were down for hours. Rival Facebook faced a similar attack (likely related), but for the most part managed to remain online. Some users couldn’t access the site or post content, but the site remained online for most users. Facebook’s statement: Earlier this morning, Facebook encountered network issues related to an apparent distributed denial of service attack, that resulted in degraded service for some users. No user data was at risk and we have restored full access to the site for most users. We’re continuing to monitor the situation to ensure that users have the fast and reliable experience they’ve come to expect from Facebook. We’ve also heard that Facebook and Twitter are working together to figure out exactly which 15 year olds are responsible for organizing the attack.
Botnet worm in DOS attacks could wipe data out on infected PCs
- Elinor Mills
09 July 2009
Read Full Story on CNET News
The denial-of-service attacks against Web sites in the U.S. and South Korea that started last weekend may have stopped for now, but code on the infected bots was set to wipe data on Friday, security experts said. There were no immediate reports of any of the compromised PCs in the botnet having files deleted, but that doesn\'t mean it wasn\'t happening or won\'t in the future, said Gerry Egan, a product manager in Symantec\'s Security Technology Response group. (Click here for Larry Magid\'s related podcast with Symantec expert.) There are only about 50,000 infected PCs around the world being used in the attacks, which is relatively small compared to the millions that were infected with Conficker, he said.
PCs Used in Korean DDoS Attacks May Self Destruct
- Brian Krebs
08 July 2009
Read Full Story on The Washington post
There are signs that the concerted cyber attacks targeting U.S. and Korean government and commercial Web sites this past week are beginning to wane. Yet, even if the assaults were to be completely blocked tomorrow, the attackers could still have one last, inglorious weapon in their arsenal: New evidence suggests that the malicious code responsible for spreading this attack includes instructions to overwrite the infected PC's hard drive.
First Page | ...96, 97, 98, 99, 100, 101, 102, 103 | Last Page