Security Alerts & News
by Tymoteusz A. Góral

History
#1636 Dyn DDoS could have topped 1 Tbps
As more time passes, researchers are getting insight into the size and structure of the DDoS attack against DNS provider Dyn last week, and the capabilities of the Mirai botnet.

First, Dyn released a truncated post-mortem on the attack with admittedly some omissions as a law enforcement investigation continues. Executive Vice President of Products Scott Hilton published a report yesterday that explains how the first of two sizable attacks began at 7 a.m. against its Managed DNS platform in Asia, Europe and South America before concentrating on the U.S. East region. A large number of IP addresses honed in with UDP and TCP packets targeting port 53, Hilton said.
Read more
#1645 Don’t Skype and Type! Acoustic eavesdropping in VOIP (PDF)
#1644 The Dyn report: What we know so far about the world's biggest DDoS attack
#1643 Remote code execution vulnerabilities plague LibTIFF library
#1642 Lawmakers asking what ISPs can do about DDoS attacks
#1641 Paypal fixes 'worrying' security bug
#1640 Windows Atom tables can be abused for code injection attacks
#1639 Microsoft Office malware: Now more users get anti-hacker, macro-blocking features
#1638 Flash Player zero-day being exploited in targeted attacks
#1637 Joomla update fixes two critical issues, 2FA error
#1636 Dyn DDoS could have topped 1 Tbps
#1635 Cisco patches critical vulnerability in facility events response system
#1634 Could your 'smart' home be a weapon of web destruction?
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12