Biggest Web attack of More than 1TB Reported by OVH founder Octave Klaba

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Biggest Web attack of More than 1TB Reported by OVH founder Octave Klaba

    Previous attack was of 620Gbps (Gigabits per second) on security expert Brian Krebs’ website, which lead to website offline for nearly a week.

    OVH attacked by botnet (zombie army) of hacked devices such as webcams to knock it offline. It has thrown the spotlight once again on the security of IOT (Internet of Things) devices. Website is hit by massive amount of data so-called distributed deanial of service attack.

    Accourding to Akmail the security firm that supported the site – the attack was nearly double the size of any previous one it had seen and was “among the biggest assaults the internet has ever witnessed”.

    Recently Symantec security firm reports that cybercrimanls looking for vulnerable devices such as TVs, home security systems and webcams for IOT malware.

    Symantec General Manager Nick Shaw says:
    Cybercriminals are interested in cheap bandwidth to enable bigger attacks. They obtain this by hijacking our devices and stitching together a large web of consumer devices that are easy to infect because they lack sophisticated security,
    Chief Technology Officer at Security firm Corero Dave Larson says:
    IoT botnets were disrupting the industry. The tools and devices used to execute the attacks are readily available to just about anyone; combining this with almost complete anonymity creates a recipe to break the internet.

  • #2
    Now cyber criminals are targeting Online gambling companies. A new most powerful DDOS attack 'Mirai' registered publicly on September 30, 2016, hacking community website HackForums. Thousands of meaningless requests for information temporarily paralyzes the company's website until demanded ransom paid or web-hosting technical can fend off the threat.

    Hackers have potent to hold, and online business owners are unsure to protect themselves and their customers completely. The bot has terrifying capabilities and is multitudinous in nature, and coming from every place on the face of the planet.

    Comment


    • #3
      Corero Network Security

      How about Corero Network Security DDoS defense solutions? Why not hosting providers trust on such 3-rd party vendors?

      Coreror is the leader in real-time, high-performance DDoS defense solutions. It provides automatic attack detection in real time and mitigation, coupled with complete network visibility, analytics, and reporting. Only legitimate user traffic is allowed to continue to flow as intended. It acts as a black box, requiring little or no intervention from any security or operations personnel.

      Comment


      • #4
        Our world tends to move towards the Internet-enabled devices with sensors producing a multitude of data. On the pro-side, it enhances the businesses efficiently, as much information is available for big data analysis. Every sector is eager to incorporate IoT devices into their existing networks.

        It revolutionalises the way we think and interact with technology and has a great impact on our lives on a daily basis.

        On the contrary, it has attracted hackers to tap into various products and leverage them for nefarious purposes.

        WSJ reveals that in the attack against KrebsOnSecurity and Frech web hosting OVH IP cameras and DVRs used.

        All the devices attached to the network like routers, printers can become an entry point for cybercriminals to steal sensitive data or even tamper critical systems.

        New guidance report released by 'The Cloud Security Alliance’s Internet of Things Working Group,' which intends to help device makers design and develop more inherently secure IoT products. The devices lack basic security controls, and are vulnerable, as they are still using default usernames and passwords.

        The report specifically lays out 13 considerations for developing “reasonably secure” IoT devices. These includes:
        • Secure Development Methodology
        • Secure Development and Integration Environment
        • Identity Framework and Platform Security Features
        • Establish Privacy Protections
        • Hardware Security Engineering
        • Protect Data
        • Secure Associated Apps/Services
        • Protect Interfaces/APIs
        • Provide Security Update Capability
        • Implement Secure Authorization
        • Establish Secure Key Management
        • Provide Logging Mechanisms
        • Perform Security Reviews

        Comment

        Best Hosting Providers

        Collapse

        Announcement

        Collapse
        No announcement yet.
        Working...
        X