Artikel zum Thema "DDoS-Attacke" bei CIO.de

Reaktion nach schweren Security-Attacken

Schneider Versand: Reaktion nach schweren Security-Attacken (Foto: Schneider)
Schneider Versand: Drei Tage musste der Versandhändler im Dezember 2011 wegen DDoS-Angriffen offline gehen. Jetzt löst eine Cloud-Lösung von Akamai das alte Open-Source-System ab. » zum Artikel
  • Hartmut Wiehr

BlackBerry Security Exec Warns of Smartphone DDoS Attacks

BlackBerry and in general hasn't garnered much attention or concern over the past few years--at least from a consumer, or user, perspective; enterprises have been invested in mobile device security since the advent of the PDA. » zum Artikel

Biz Stone: Lessons learned from crippling DDoS attack

said that the denial-of-service attack that knocked the microblogging site offline last week convinced him that the company has to quickly muscle up to deal with its phenomenal popularity and the problems it brings. » zum Artikel

Twitter withstands second DDoS attack in a week

Less than a week after by a highly publicized distributed denial-of-service attack, the microblogging site was hit by hackers again late yesterday. » zum Artikel

Twitter Continues to Battle DDoS Attack

More than two days after experiencing a complete outage as a result of a and other social networking sites such as Facebook are . Twitter has taken some steps to mitigate the spike in traffic and ensure that the site is not knocked offline again, but some of those steps are having an impact on third-party tools that link to Twitter through API's (application programming interface). » zum Artikel

Twitter DDoS Attack Reminder for Safe Web Habits

Facebook, LiveJournal, and most visibly . What's not clear is exactly why these sites were targeted. Current speculation is that the Koobface worm, whose name is a Facebook anagram, may be responsible for the attacks. A fresh wave of infections from a new variant of the worm supports this possibility. Let this serve as a warning that we can never remind our users too often about safe surfing practices. » zum Artikel

Twitter DDoS Attack Politically Motivated, says Report

The distributed denial of service , Facebook, LiveJournal and several Google sites may have been politically motivated. The reported target of these attacks was a blogger named Cyxymu from the Eastern European country of Georgia who is an outspoken supporter of his country. Facebook's chief security officer, Max Kelly has said the attack was coordinated to "keep his [Cxymu's] voice from being heard," ... » zum Artikel

DDoS attack that downed Twitter also hit Facebook

The same denial-of-service attack that took down Twitter this morning also slammed Facebook but with much less dramatic results. » zum Artikel

Twitter knocked offline by DDoS attack

Twitter confirmed this morning that its site has been taken down by a distributed denial-of-service (DDoS) attack. » zum Artikel

News analysis: DDoS attacks highlight need to reduce government Internet access points

The that severely disrupted several federal agency Web sites this week highlights the need for the government to quickly finish implementing its ongoing consolidation of Internet access points, the former de facto CIO of the federal government and others said today. » zum Artikel

North Korea: Culprit in DDoS Attacks

The timing and targets in . After all, the attacks coincided with the rogue state's firing of missiles during the July 4 Independence Day Weekend and the U.S. and South Korea were the countries in the cyber crosshairs. » zum Artikel

Feds arrest man allegedly behind DDoS attacks

The Computerworld (US) story posted to the wire Tuesday, "Feds arrest man allegedly behind DDoS attacks against 'Rolling Stone,'" incorrectly identified the author in the byline of the story. The story has been fixed on the wire and the byline of the story has been changed to "Sharon Gaudin." » zum Artikel

Feds arrest man allegedly behind DDoS attacks against Rolling Stone

A Pennsylvania man has been charged with allegedly launching (DDoS) attacks against at least nine Web sites, including Rolling Stone magazine's site, which was attacked multiple times for nearly a year. » zum Artikel

Parabon launches grid-based DDoS attack tests

Distributed denial of service (DDoS) attacks of the kind that are hard to defend against because they typically involve thousands of compromised computers knocking a Web site or server offline by simultaneously sending it torrents of useless traffic. » zum Artikel

DDoS attacks knock Radio Free Europe off the Web

Several Radio Free Europe Web sites were knocked off the Internet a week ago in a distributed denial-of-service (DDoS) attack that the news organization's spokesman compared to attempts decades ago by the Soviet Union to jam the U.S.-funded group's radio signals. » zum Artikel

Britischer Geheimdienst spähte Anonymous-Hacker aus

Enthüllung von Edward Snowden: Der britische Geheimdienst GCHQ hat offenbar gezielt Hacker und Aktivisten der Online-Gemeinschaft Anonymous ins Visier genommen. » zum Artikel

DDoS-Angriffe erfolgreich abwehren

Webinar von Fortinet: DDoS-Angriffe erfolgreich abwehren (Foto: kentoh - Fotolia.com)
Webinar von Fortinet: Die jüngste DDoS-Attacke auf die Süddeutsche Zeitung hat es einer breiten Masse noch einmal vor Augen geführt: Distributed Denial of Service gehört nach wie vor zu den am häufigsten angewendeten Angriffsszenarien der Cyber-Kriminellen. Das bestätigen auch Untersuchungen des Bitkom und der European Network and Information Security Agency (ENISA). » zum Artikel
  • Ronald Wiltscheck

Twitter Attack Was Another Political DDoS

The distributed denial-of-service attack that hampered access to social networking and blogging sites all went after one pro-Georgia blogger, according to security company reports. » zum Artikel

Twitter attack relatively small potatoes

Although last week's on garnered lots of headlines, analysts at say that the attack was a relatively small operation that paled in comparison to big DDoS attacks that occur every day. » zum Artikel

6 Maßnahmen für mehr IT-Sicherheit

Neue IT-Security-Technologien: 6 Maßnahmen für mehr IT-Sicherheit (Foto: seen - Fotolia.com)
Neue IT-Security-Technologien: Unternehmen hinken bei der IT-Security technologisch hinterher. Sechs Tipps zeigen auf, wie moderne Tools für Abhilfe sorgen können. » zum Artikel
  • Andreas Schaffry
    Andreas Schaffry


    Dr. Andreas Schaffry ist freiberuflicher IT-Fachjournalist und seit 2006 für die CIO.de-Redaktion tätig. Die inhaltlichen Schwerpunkte seiner Berichterstattung liegen in den Bereichen ERP, Business Intelligence, CRM und SCM mit Schwerpunkt auf SAP und in der Darstellung aktueller IT-Trends wie SaaS, Cloud Computing oder Enterprise Mobility. Er schreibt insbesondere über die vielfältigen Wechselwirkungen zwischen IT und Business und die damit verbundenen Transformationsprozesse in Unternehmen.

Arbor adds ATLAS capabilities to latest Peakflow edition

Network vendor Arbor Networks has integrated its Internet monitoring system into the latest edition of its Peakflow security system. » zum Artikel

Japan testing 'virus' cyberdefence weapon, reports say

The Japanese authorities have tested a 'virus' cyberweapon capable of tracing and disabling computers being used in cyberattacks against the country, a newspaper in the country has reported. » zum Artikel

9 Hacking-Trends für 2012

HTML 5 als Einfallstor: 9 Hacking-Trends für 2012 (Foto: PAV Germany GmbH Panda Security Deutschland)
HTML 5 als Einfallstor: Hacker werden 2012 ihre Angriffe auf SSL-Komponenten, HTML 5 und Collaboration-Plattformen konzentrieren. Auch DDoS-Attacken sollen laut Imperva zulegen. » zum Artikel
  • Andreas Schaffry
    Andreas Schaffry


    Dr. Andreas Schaffry ist freiberuflicher IT-Fachjournalist und seit 2006 für die CIO.de-Redaktion tätig. Die inhaltlichen Schwerpunkte seiner Berichterstattung liegen in den Bereichen ERP, Business Intelligence, CRM und SCM mit Schwerpunkt auf SAP und in der Darstellung aktueller IT-Trends wie SaaS, Cloud Computing oder Enterprise Mobility. Er schreibt insbesondere über die vielfältigen Wechselwirkungen zwischen IT und Business und die damit verbundenen Transformationsprozesse in Unternehmen.

Mobile Security lässt CIOs schlecht schlafen

Riesige Sicherheitslücken: Mobile Security lässt CIOs schlecht schlafen (Foto: Monika Wisniewska - Fotolia.com)
Riesige Sicherheitslücken: Insgesamt 91 Prozent aller Nutzer halten einer Umfrage zufolge Daten im Unternehmen für sicher - obwohl es immer mehr Security Breaches gibt. » zum Artikel
  • Bettina Dobe
    Bettina Dobe


    Bettina Dobe ist freie Journalistin aus München. Sie hat sich auf Wissenschafts-, Karriere- und Social Media-Themen spezialisiert. Sie arbeitet für zahlreiche Zeitungen und Zeitschriften in Deutschland.

FBI warns of new Zeus-based malware in phishing scam

So long as people click on , scammers will invent new ways to take their money, identities and more. » zum Artikel

Arbor Networks bolsters Internet monitoring system

Network vendor is collaborating with more than 100 ISPs worldwide to create a more comprehensive Internet monitoring system. » zum Artikel

No sign of N. Korean backing in bot attacks on U.S. sites, says researcher

There's nothing in the code of the malware used since Saturday to attack a wide array of U.S. and South Korean government and high-profile Web sites that indicates the campaign is backed by the government of North Korea, a noted botnet researcher said today. » zum Artikel

Learning Lessons From the Twitter Outage

Unless you have been living in a cave or off the grid for the past 24 hours or so, you are probably aware that yesterday morning as a result of a distributed denial-of-service (DDoS) attack that overwhelmed its servers. The same attack was also targeted at other sites such as Facebook and Google, but Facebook only experienced performance issues and Google seems to have been relatively unaffected. ... » zum Artikel

'We're not scared' of Storm, say researchers

Reports that security researchers are running scared from hackers responsible for the Storm Trojan are overblown, say some of the people who have dug into the complex malware. » zum Artikel

Developers eager to see Twitter improve platform stability

Many Twitter applications have suffered lengthy periods of downtime recently, a situation that has some developers concerned about the company's platform stability. » zum Artikel


Artikel zum Thema "DDoS-Attacke" im IDG-Netzwerk
 

Der Frankfurter DDoS-Schutzanbieter Link11 stellt ein neues Live-Monitoring-System zur Verfügung, mit dem Anwender jederzeit in die laufenden Security-Prozesse eingreifen können.
Der Frankfurter DDoS-Schutzanbieter Link11 stellt ein neues Live-Monitoring-System zur Verfügung, mit dem Anwender jederzeit in die laufenden Security-Prozesse eingreifen können.
DDoS ist zwar technisch gesehen ein sehr altes Phänomen, aber noch immer beliebt und erfolgreich...