One of the largest known breaches, resulting in 110 million records lost and hundreds of millions of dollars in damages, started with a small, third-party supplier. We’re talking about Target, where attackers compromised Fazio ...
Tags: Supply Chain, Electrical, Electronics
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products. Unlike other bug bounty programmes, the ...
Tags: security, researcher, laud, Microsoft, Facebook, bounty
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT. A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc ...
Tags: Computer Products, IT
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
Although cyberattacks caused just 6 percent of significant outages of public electronic communications networks and services in the E.U. last year, they affected more people than hardware failure, a much more common factor in service ...
Tags: Computer Products, webservice
File-sharing website The Pirate Bay has launched a browser that it claims will circumvent blocks from internet service providers (ISPs) on its site and other similar webpages. The browser, dubbed PirateBrowser, was launched as a 'gift' ...
Tags: Pirate Bay, File-Sharing
Web content filtering company Netsweeper has supplied its products to Pakistan, even as some top IT companies have refused to supply gear for a controversial filtering project, a Canadian research group has disclosed. The new report ...
Tags: Netsweeper, Internet Content, Pakistan
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers ...
Tags: Computer Products
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS
DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic bombardments ever recorded, mitigation firm Prolexic has reported. The 167 Gbps peak attack hit what is being ...
Tags: DDoS Attack, Financial Firm
For the latest release of its Foglight application performance management (APM) software, Dell has provided a new view that summarizes how transactions perform across a system. "We're pulling together all the aspects of a user's ...
Tags: Dell Foglight, Transaction
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products