TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future in which refrigerators monitor their own contents and send orders direct to the grocer when the butter is running out, while tired commuters order baths to be drawn automatically using their smartphones as they approach their houses in their self-driving cars. Actually, though, a version of the IoT is already here. Wi-Fi hubs, smart televisions, digital video-recorders and the like are all part of a network of devices run by microprocessors that, just as much as desktop, laptop and tablet computers, form part of the internet—but with one crucial distinction. Unlike things immediately recognisable as computers, these devices are often designed with poor security, or even none at all. They are wide open to malicious hackers who might wish to misuse them. And there are already around 5 billion of them, according to Cisco, the world’s largest computer-networking company, with billions more to come in the years ahead.
One favourite trick of such hackers is the distributed denial of service attack, or DDoS. This temporarily enslaves a number of internet-enabled devices into an arrangement known as a botnet, and then directs this net to send simultaneous requests for attention to a single machine or cluster of machines, thus overwhelming it and making it unusable. Such attacks may be carried out by organised criminals, to hold a firm to ransom; by cyber-savvy countries, as a tool of low-level warfare—or, as in the case of one of the latest attacks, for revenge.
The victim is Brian Krebs, an American journalist who often reports on internet criminals, including those who run DDoS-for-hire services, and also those involved in the “dark” markets that trade in stolen identities and credit-card details. In the past, some of the people he has annoyed have sent heroin to his home while alerting the police to the fact they might find the drug there. This time, the very internet itself was turned against him. On September 20th Mr Krebs’s web server became the target of one of the largest DDoS attacks ever recorded—between 600 billion and 700 billion bits per second, or almost half a percent of the internet’s entire capacity, for hours at a time.
At first, his “network mitigation provider”, a firm called Akamai that was supplying its services to him free, for the general good of the field, was able to ward off these attacks. Eventually, though, it had to surrender. On September 23rd, with his agreement, it cut him loose and he had to shut down until he could make alternative arrangements.
Though Mr Krebs’s case is extreme by current standards, there is a risk it will soon become typical. Matthew Prince, the boss of CloudFlare, a firm that helps websites manage heavy traffic and deal with assaults of this sort, says his firm has already seen a sustained ten-day trillion-bits-per-second DDoS attack—though that was launched by a country (he declined to say which) rather than by a private criminal organisation. Other firms, such as OVH, a French web-hosting service, have also reported attacks of this magnitude.
Learn more: Cyber-security – The internet of stings
The Latest on: Cyber security
[google_news title=”” keyword=”Cyber security” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Cyber security
- How cloud modernization transformed OPM cybersecurity operationson February 27, 2024 at 12:27 pm
By shifting to cloud-native solutions, the U.S. Office of Personnel Management has significantly enhanced its underlying security infrastructure to better protect the agency from evolving cyber ...
- NIST updates Cybersecurity Framework after a decade of lessonson February 27, 2024 at 10:45 am
The original was definitely getting a bit long in the tooth for modern challenges After ten years operating under the original model, and two years working to revise it, the National Institute of ...
- Cencora discloses data breach in cybersecurity incidenton February 27, 2024 at 9:56 am
(Reuters) -Cencora Inc on Tuesday disclosed a cybersecurity incident in which data, some of which may have contained personal information, was stolen from the drug distributor's information systems.
- Energy to fund 16 infrastructure cybersecurity projectson February 27, 2024 at 9:17 am
The White House’s cybersecurity strategy implementation plan asks the agency to identify pilot projects for energy infrastructure security.
- 9 Steps to Fostering a Cybersecurity-Aware Cultureon February 27, 2024 at 7:33 am
Lawmakers, compliance standards, and cyber insurers are now requiring organizations to conduct cybersecurity awareness education and training. And not a moment too soon. Americans suffered $10 billion ...
- NIST releases expanded 2.0 version of the Cybersecurity Frameworkon February 27, 2024 at 3:36 am
The US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the ...
- NIST publishes Cybersecurity Framework 2.0: 3 key takeawayson February 26, 2024 at 5:59 pm
NIST released its Cybersecurity Framework 2.0 (CFS 2.0) on Monday, introducing a new core structure, resource catalog and overall scope of application to the already widely used resource. The highly ...
- HSCC Issues Five-Year Health Industry Cybersecurity Strategic Planon February 26, 2024 at 4:00 pm
February 27, 2024 - The Healthcare and Public Health (HPH) Sector Coordinating Council (HSCC) Cybersecurity Working Group (CWG) announced the publication of its “Health Industry Cybersecurity ...
- Cybersecurity statistics in 2024on February 26, 2024 at 3:59 pm
A report on cyber security predicted that the cost of cybercrime would reach a massive $9.5 trillion in 2024 and would be in excess of $10.5 trillion in 2025. In the United States alone, an FBI report ...
via Bing News