New cyber-assault methods pop up

Published: 31 December 1999 y., Friday
As the pre-Y2K hype enters its final phase, computer watchdogs have identified twonew techniques for bringing Internet sites down: One of the denial-of-service attacks is nicknamed TFN2K, the other is called the "Mac Flood Attack." Neither of them is directly related to the Year 2000 computer bug itself, but the failures they cause could be misinterpreted as New Year_s glitches. TFN2K is a variant of a previously reported denial-of-service attack known as TFN or Tribe FloodNet . The attacker can make it look like data requests are coming in from multiple sources - which makes it harder to track down the source of the attack.TFN2K adds another twist by intentionally sending data errors "designed to crash or introduce instabilities in systems," the center said. CERT advised system administrators to follow industry guidelines to guard against denial-of-service attacks, and to install filtering software that recognizes when Internet traffic is coming from bogus sources. The second attack strategy targets Apple Macintosh computers running the MacOS 9 operating system with full-time connections to the Internet (under some conditions, systems using MacOS 8.6 also may be vulnerable). John Copeland, a computer engineering professor at the Georgia Institute of Technology, reported that an attacker could send relatively small amounts of fake data in such a way that the Macs would be triggered to send larger transmissions in reply.
Šaltinis: MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

What impact will sites like Facebook and YouTube have in the EP elections?

Networking sites like Facebook and YouTube are changing politics. more »

Santander Selects Wincor Nixdorf for its ATMs

Vendor to service almost 4,000 existing ATMs and supply another 450. more »

WINCOR: Check 21, deposit automation will revolutionize the branch

The advent of deposit automation, facilitated in many ways by the implementation of Check 21, is not only improving check-handling processes at the self-service terminal – it also is improving handling within the bank branch itself. more »

Moroccan Post Office chooses Bull

The Moroccan Post Office, Barid Al-Maghrib, has selected Bull to act as project manager on the automation project for its International Mail Center in Casablanca. more »

Gemalto Wins Austin Business Journal Tech Innovation Award

Gemalto has taken home one of the most coveted technology prizes in Austin with its Smart Enterprise Guardian (SEG). more »

So-called 'bam-raids' on Aussie ATMs get bankers' attention

Banks in Australia are rushing to install gas detectors into their ATMs, as gas-explosive attacks on ATMs in the country continue to climb. more »

EMC and Microsoft Extend Strategic Alliance Through 2011

EMC CEO Joe Tucci and Microsoft CEO Steve Ballmer showcase deep technology collaboration at New York CIO Summit. more »

Gemalto and mChek Join Forces to Serve Mobile Payment Markets in South Asia

India-based mChek looks to offer its secured SIM-card-based mobile applications through partnership with Gemalto. more »

Heartland Payments CEO says end-to-end encryption could prevent card, data breaches

Nearly one week after news emerged of the big data breach at Princeton, N.J.-based merchant acquirer Heartland Payment Systems Inc., it remains unclear how much damage actually happened and who did it. more »

Wincor Nixdorf launches new ATM tech that shields ATMs from attacks

Wincor Nixdorf AG has announced the release of an enhanced security product for bank branches called ProTect. more »