TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future in which refrigerators monitor their own contents and send orders direct to the grocer when the butter is running out, while tired commuters order baths to be drawn automatically using their smartphones as they approach their houses in their self-driving cars. Actually, though, a version of the IoT is already here. Wi-Fi hubs, smart televisions, digital video-recorders and the like are all part of a network of devices run by microprocessors that, just as much as desktop, laptop and tablet computers, form part of the internet—but with one crucial distinction. Unlike things immediately recognisable as computers, these devices are often designed with poor security, or even none at all. They are wide open to malicious hackers who might wish to misuse them. And there are already around 5 billion of them, according to Cisco, the world’s largest computer-networking company, with billions more to come in the years ahead.
One favourite trick of such hackers is the distributed denial of service attack, or DDoS. This temporarily enslaves a number of internet-enabled devices into an arrangement known as a botnet, and then directs this net to send simultaneous requests for attention to a single machine or cluster of machines, thus overwhelming it and making it unusable. Such attacks may be carried out by organised criminals, to hold a firm to ransom; by cyber-savvy countries, as a tool of low-level warfare—or, as in the case of one of the latest attacks, for revenge.
The victim is Brian Krebs, an American journalist who often reports on internet criminals, including those who run DDoS-for-hire services, and also those involved in the “dark” markets that trade in stolen identities and credit-card details. In the past, some of the people he has annoyed have sent heroin to his home while alerting the police to the fact they might find the drug there. This time, the very internet itself was turned against him. On September 20th Mr Krebs’s web server became the target of one of the largest DDoS attacks ever recorded—between 600 billion and 700 billion bits per second, or almost half a percent of the internet’s entire capacity, for hours at a time.
At first, his “network mitigation provider”, a firm called Akamai that was supplying its services to him free, for the general good of the field, was able to ward off these attacks. Eventually, though, it had to surrender. On September 23rd, with his agreement, it cut him loose and he had to shut down until he could make alternative arrangements.
Though Mr Krebs’s case is extreme by current standards, there is a risk it will soon become typical. Matthew Prince, the boss of CloudFlare, a firm that helps websites manage heavy traffic and deal with assaults of this sort, says his firm has already seen a sustained ten-day trillion-bits-per-second DDoS attack—though that was launched by a country (he declined to say which) rather than by a private criminal organisation. Other firms, such as OVH, a French web-hosting service, have also reported attacks of this magnitude.
Learn more: Cyber-security – The internet of stings
The Latest on: Cyber security
via Google News
The Latest on: Cyber security
- Accenture strengthens security-focused portfolio buying Symantec's Cyber Security Serviceson January 10, 2020 at 10:51 am
Broadcom is selling off the security services business after acquiring it in August.
- How AI, ML, and automation can improve cybersecurity protectionon January 10, 2020 at 10:03 am
Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches. Traditional cybersecurity tools such as mere anti-malware software or ...
- Microsoft contractors in China listened to Skype recordings with woefully bad levels of cybersecurity, report revealson January 10, 2020 at 5:01 am
A Microsoft contractor told the Guardian he had incredibly insecure access to sensitive recordings while working from his personal laptop in Beijing.
- Cybersecurity acquisitions run rampant this week: Who has bought what?on January 10, 2020 at 3:00 am
In what appears to be the week for cybersecurity acquisitions, companies, their inventions, and patent portfolios are changing hands worldwide. We began the week with the news that Armis Security, a ...
- The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know Abouton January 9, 2020 at 9:47 pm
More and more of our vital infrastructure is coming online and vulnerable to digital attacks, data breaches involving the leak of personal information are becoming more frequent and bigger, and ...
- State Officials Address Heightened Iranian Cybersecurity Threatson January 9, 2020 at 12:19 pm
In the wake of Iran's missile strike on Iraqi bases housing American military forces, governors across the U.S. have announced heightened cybersecurity threats for their state agencies and local ...
- Nine Cybersecurity Metrics Every CEO Should Trackon January 9, 2020 at 5:10 am
Consistent measurement and reporting across an established set of metrics will help CEOs to understand the operational capability of their SOC toward enterprise threat detection and response.
- Cities, states face costly cybersecurity landscape after attacks spiked in 2019on January 9, 2020 at 4:04 am
Cybersecurity expert Jacob Doiron, an information systems lecturer at San Diego State University, said government entities, healthcare institutions and school districts are some of the most common ...
- Cyber security firm NortonLifeLock cuts dozens of Bay Area jobson January 9, 2020 at 3:29 am
SAN JOSE — Cyber security giant NortonLifeLock — until recently called Symantec Corp. — is laying off 129 workers in San Francisco and Mountain View. Seventy-four workers will be cut in Mountain View ...
via Bing News