Items Tagged with "Denial of Service"


Adobe Releases Updates for Critical Vulnerabilities

January 12, 2012 Added by:Headlines

Adobe has released updates to mitigate critical vulnerabilities in the company's Adobe Reader and Acrobat products. The vulnerabilities addressed leave systems open to remote access and control, system crashes, and denial of service exploits...

Comments  (0)


FBI Warns: GameOver

January 10, 2012 Added by:Kevin McAleavey

The significant part of the DDOS angle with the GameOver Zeus Trojan attack is that it serves as a diversion while the looting continues, and prevents access to mitigation with the bank until it's too late. That's what motivated the FBI to put out this alert...

Comments  (0)


ICS-CERT: 3S Smart Software CoDeSys Vulnerabilities

January 10, 2012 Added by:Headlines

Mr. Auriemma publicly disclosed the five vulnerabilities along with proof-of-concept exploit code, including the vulnerability previously coordinated with ICS-CERT by Celil Unuver, without coordination with 3S Smart Software Solutions, ICS-CERT, or any other coordinating entity...

Comments  (0)


ICS-CERT: Siemens Tecnomatix FactoryLink ActiveX

January 05, 2012 Added by:Headlines

Researchers identified two vulnerabilities affecting ActiveX components in the Siemens Tecnomatix FactoryLink application, including buffer overflow and data corruption. Successful exploitation of the vulnerabilities could allow an attacker to perform denial of service and arbitrary code execution...

Comments  (0)


Medical Device Security: Killed by Code

January 04, 2012 Added by:Danny Lieberman

I’ve been talking to our medical device customers about mobile security of implanted devices for over a year now. I think it’s only a question of time before we have a drive by execution of a politician with an ICD (implanted cardiac device)...

Comments  (0)


US CERT: Hash Table Collision Attack Vulnerability

January 04, 2012 Added by:Headlines

US-CERT is aware of reports stating that multiple programming language implementations, including web platforms, are vulnerable to hash table collision attacks. This vulnerability could be used by an attacker to launch a denial-of-service attack against websites using affected products...

Comments  (0)


Japanese Defense Ministry Developing Cyber Weapon

January 03, 2012 Added by:Headlines

"The program can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers...."

Comments  (1)


The Security Impact of Performance

December 22, 2011 Added by:Rafal Los

DDoS is being used as a tool that has turned poor performing systems into weapons against their implementers. It proves that no matter how big the pipe you have, it's possible to push so much traffic that the odds of handling it properly and staying available are virtually zero...

Comments  (2)


OWWWS - The Other Form of Occupy

December 15, 2011 Added by:Rafal Los

If we we consider the Occupy movements across the globe, demonstrating and protesting against income inequality and inequitable policies around commerce and taxation, the persistent cart vulnerability could become a seemingly benign form of occupation that could develop into a serious threat...

Comments  (0)


Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)


Anonymous Affiliate Arrested for 2010 DDoS Attack

December 14, 2011 Added by:Headlines

"According to the indictment, Poe used a favorite software tool of the Anonymous collective—a Low Orbit Ion Cannon, which is a computer program that is used to send extremely large numbers of “packets” or requests over a network in an attempt to overwhelm a target computer..."

Comments  (0)


DDoS: The Message is Often Lost in the Noise

November 22, 2011 Added by:security curmudgeon

Most in the security industry frown upon botnet-for-hire operators that sell their stolen bandwidth for illicit purposes. Personally, while I don't like or agree with it, I understand it. They are no different than any other person selling questionable or illicit services or goods in our society...

Comments  (0)


Hacktivist Hypocrisy and First Amendment Rights

November 07, 2011 Added by:Jim Palazzolo

Interestingly enough hacktivist groups typically attempt to champion such things as things as privacy and freedom of speech, but seem to have no issue with denying other people the same freedoms. However, who are these individuals to decide who has the right to speak and who does not?

Comments  (0)


Anonymous DDoS Attack on NYSE Fails to Materialize

October 11, 2011 Added by:Headlines

Was the attack just a hoax to pique the media? Perhaps another faction striking off on their own? Or was the operation such a complete failure that the Anonymous ringleaders decided they needed to save face by claiming the attack was just a rouse? Probably a little of all of the above...

Comments  (6)


Anonymous Splinters over Planned NYSE Attacks

October 04, 2011 Added by:Headlines

While the tough sounding rhetoric may work to inspire some followers of Anonymous to join the attacks, other members of the collective have issued warnings that the attacks will simply result in more arrests, stating "We do not want history to repeat itself, and are sincerely worried..."

Comments  (0)


Apache Killer DoS Vulnerability Patch Released

August 31, 2011 Added by:Headlines

The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.2.20 of the Apache HTTP Server with a fix for handling of byte-range requests and avoid a denial of service. We consider this release to be the best version of Apache available...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »