Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Anatomy of an exploit – Linksys router remote password change hole

An interesting posting from Naked Security: A security researcher from San Jose in California has published a how-to guide detailing a number of vulnerabilities in various Linksys routers. Phil Purviance, who goes by the handle of SUPER.EVR (EVR stands for Exploitation Vulnerability Research), reported the holes privately on 05 March 2013:   And Purviance certainly lived up […]

Spamhaus DDoS Attacks: What Business Should Learn

An posting from Information week  in there security section: The distributed denial-of-service (DDoS) campaign aimed at anti-spam group Spamhaus over the past week, allegedly orchestrated by Stophaus.com, set the equivalent of a new land-speed record by reaching attack volumes that peaked at a whopping 300 Gbps.   Regardless of the mechanics of that attack — or whether it triggered widespread Internet access […]

Anatomy of an exploit – Linksys router remote password change hole

An interesting posting from Naked Security: A security researcher from San Jose in California has published a how-to guide detailing a number of vulnerabilities in various Linksys routers. Phil Purviance, who goes by the handle of SUPER.EVR (EVR stands for Exploitation Vulnerability Research), reported the holes privately on 05 March 2013:   And Purviance certainly lived up […]

Spamhaus DDoS Attacks: What Business Should Learn

An posting from Information week  in there security section: The distributed denial-of-service (DDoS) campaign aimed at anti-spam group Spamhaus over the past week, allegedly orchestrated by Stophaus.com, set the equivalent of a new land-speed record by reaching attack volumes that peaked at a whopping 300 Gbps.   Regardless of the mechanics of that attack — or whether it triggered widespread Internet access […]