Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS
Over 100,000 devices have a misconfigured service called multicast DNS that accepts requests from the Internet and can potentially be abused to amplify distributed …
The easy Java and Flash security fix everyone hates to do
Quickly patching vulnerable software is key to keeping computer systems secure. Yet, consumers are increasingly leaving their systems open to attack by failing to …
Popular hotel Internet gateway devices vulnerable to hacking
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of …
Akamai: Most Internet attacks in Q4 originated in China
A majority of the Internet attack traffic in 2014’s fourth quarter originated in China, followed by the U.S., according to cloud service provider Akamai. …
‘Threat-sharing’ cybersecurity bill introduced in U.S. House
Leaders of the House of Representatives Intelligence Committee introduced legislation on Tuesday to make it easier for companies to share information about cybersecurity threats …
Stealing Data From Computers Using Heat
AIR-GAPPED SYSTEMS, WHICH are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in …
At least 700,000 routers that ISPs gave to their customers are vulnerable to hacking
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of …
Anti-censorship group in China faces DDoS attack
An activist group working to end China’s Internet censorship is facing an ongoing distributed denial of service (DDoS) attack that threatens to cripples its …
Six clicks: How hackers use employees to break through security walls
No one wants to think about the idea of their company’s customer data, infrastructure, IP or network security as the full-time target for hired-gun …
Recent Comments