Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Anatomy of an exploit – Linksys router remote password change hole
An interesting posting from Naked Security: A security researcher from San Jose in California has published a how-to guide detailing a number of vulnerabilities in various Linksys routers. Phil Purviance, who goes by the handle of SUPER.EVR (EVR stands for Exploitation Vulnerability Research), reported the holes privately on 05 March 2013: And Purviance certainly lived up […]
Spamhaus DDoS Attacks: What Business Should Learn
An posting from Information week in there security section: The distributed denial-of-service (DDoS) campaign aimed at anti-spam group Spamhaus over the past week, allegedly orchestrated by Stophaus.com, set the equivalent of a new land-speed record by reaching attack volumes that peaked at a whopping 300 Gbps. Regardless of the mechanics of that attack — or whether it triggered widespread Internet access […]
Anatomy of an exploit – Linksys router remote password change hole
An interesting posting from Naked Security: A security researcher from San Jose in California has published a how-to guide detailing a number of vulnerabilities in various Linksys routers. Phil Purviance, who goes by the handle of SUPER.EVR (EVR stands for Exploitation Vulnerability Research), reported the holes privately on 05 March 2013: And Purviance certainly lived up […]
Spamhaus DDoS Attacks: What Business Should Learn
An posting from Information week in there security section: The distributed denial-of-service (DDoS) campaign aimed at anti-spam group Spamhaus over the past week, allegedly orchestrated by Stophaus.com, set the equivalent of a new land-speed record by reaching attack volumes that peaked at a whopping 300 Gbps. Regardless of the mechanics of that attack — or whether it triggered widespread Internet access […]