Maybe other router manufacturers are as magnificently dumb as D-Link but regardless, get rid of all D-Link routers and vow to never buy another D-Link product for a long as your lungs suck in air. The security vulnerabilities present in their devices, especially the DWR-932B router, are so far beyond stupid, well, you’d swear the […]
Posts in September, 2016
Just a week after Brian Krebs was hit with a 620Gbps IoT attack, reports are hitting the wires that OVH has been hit with an even larger attack – two simultaneous barrages of 799Gbps and 191Gbps for a whopping 990Gbps total. And this may only be the beginning…
I wasn’t too happy to hear that Akamai dropped security researcher/writer Brian Krebs last week after Kreb’s website sustained the largest-ever DDoS attack. In short, they basically offered Krebs protection from DDoS attacks until, well, they said they couldn’t. Then they dropped him leaving Krebs to fend for himself.
It’s certain to become a classic – hundreds of onlookers turning their back on an important political figure so they can attach themselves to the moment and measure their self-worth in number of likes.
Security researcher Brian Krebs of KrebsOnSecurity reported today that his site was hit with a walloping 665 Gbps DDoS attack. The attack included SYN and HTTP floods and peaked at 153 Mpps (million packets per second). Krebs’ site remained online, the attack mitigated by Akami’s DDoS protection service.
People often wonder if their names have somehow made it to the “the list”, that watchlist of US citizens whom the government suspects may be up to something. I would venture to say, the best way to know if you’re on the watchlist would be to recognize how often you find yourself forced into unique […]
I was searching for lifelike mice on Amazon today (long story) and found this unbelievably racist Halloween mask of a black man. Tiny ears, white eyes, big lips – just like the racist cartoons of the 50’s. My gut reaction was shock and I began to wonder how the seller would justify placing an item […]
Offering bounties worth thousands, even millions of dollars, bug bounties pay hackers to report vulnerabilities. The process is pretty simple. The hacker sends the vulnerability report to the company, the company patches the vulnerably, the bounty paid, and finally, the vulnerability disclosed. Everyone wins. Usually.
They broke laws in 13 states and 93 counties, reaching speeds of 160 mph, on a 2,683-mile trip from New York to Los Angeles. The jaunt should realistically take over 41 hours – they did in under 29 driving an innocuous looking Mercedes that was decked out with more gear than a Oklahoma stormchaser’s rig.
The Samsung Note 7 battery problem is indeed a major blow but not unheard of. Samsung will recover and in fact, there are already rumors they’ve ramped up customer service to save face. Still, with Apple’s new iPhone 7 coming out in mere weeks, the battery grenade problem couldn’t have happened at a more inopportune […]