Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


The dangers that Hover on the Internet

In the dangerous areas of the Internet, an enormous network of compromised machines in October 2016 aided in tentatively destabilizing some popular websites like Twitter along with others. The network through Mirai, a virus, attacked one prominent Internet infrastructure firm Dyn with an advanced DDoS (distributed denial-of-service) attack wherein unprotected online devices were commanded for overwhelming the company with data to the extent that it stopped functioning.

Bruce Schneier security guru cautioned same month that con artists were exploring the Internet's basic technology to find security flaws in it while examine its defense capacities.

The strategy as well seeks to alleviate fears regarding security flaws getting exploited via the online machines through IoT (Internet of Things). Dailymail.co.uk posted this, November 2, 2016.

According to Security Researcher Denis Makrushin of Kaspersky Lab, cyber assaults carried out with apparently innocuous online devices pose an extremely real as well as current danger.

Brian Krebs, security expert and reporter discussing dubious 'security' services, bad actors and vulnerabilities encountered an extremely big DDoS assault occurring till date.

And Omniscient apprehended his portal getting exploited and blamed for the denial of service assault against Dyn as well as the present condition prevailing over DDoS-for-Hire services that are offered for free. Fairly though, Omniscient's 'Hack Forums' isn't the lone portal that advertises such services, only that it attracts the largest visitors. He also felt his nerves tested when a quotation he gave for publication in Washington Post went off disregarded while just bits of it were used creating a wrong impression of his forum.

A The Atlantic reporter Andrew McGill tried experimenting for determining the extent of vulnerability of our devices when they're hacked. He constructed one virtual toaster, connected it to the Internet and waited for observing the speed with which hackers tried breaching it. Indeed, the hackers attacked more quickly than he thought they would.

The idea behind the experiment is that strict norms and rules could suffocate the Internet's wide dispersion. Nevertheless, as evident from the assaults similar as those on the DNS service of Dyn, the Internet's value may quite well require them.

» SPAMfighter News - 11/4/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page