New cyber-assault methods pop up

Published: 31 December 1999 y., Friday
As the pre-Y2K hype enters its final phase, computer watchdogs have identified twonew techniques for bringing Internet sites down: One of the denial-of-service attacks is nicknamed TFN2K, the other is called the "Mac Flood Attack." Neither of them is directly related to the Year 2000 computer bug itself, but the failures they cause could be misinterpreted as New Year_s glitches. TFN2K is a variant of a previously reported denial-of-service attack known as TFN or Tribe FloodNet . The attacker can make it look like data requests are coming in from multiple sources - which makes it harder to track down the source of the attack.TFN2K adds another twist by intentionally sending data errors "designed to crash or introduce instabilities in systems," the center said. CERT advised system administrators to follow industry guidelines to guard against denial-of-service attacks, and to install filtering software that recognizes when Internet traffic is coming from bogus sources. The second attack strategy targets Apple Macintosh computers running the MacOS 9 operating system with full-time connections to the Internet (under some conditions, systems using MacOS 8.6 also may be vulnerable). John Copeland, a computer engineering professor at the Georgia Institute of Technology, reported that an attacker could send relatively small amounts of fake data in such a way that the Macs would be triggered to send larger transmissions in reply.
Šaltinis: MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Gemalto Teams Up with Venezuelan Bankcard Market Leaders to Accelerate EMV Migration

Gemalto teaming up with two banking technology leaders to help banks in Venezuela move to a new, high-tech smart credit card that will better protect their customers from fraud and identity theft. more »

Thanks to the new Bull supercomputer for the Jülich Research Center

The new Bull HPC-FF1 supercomputer with 100 Teraflops-capacity will host applications for the European Union Fusion community. more »

Gemalto reports fourth quarter and full year 2008 revenue

Gemalto, the world leader in digital security today announced its revenue for the full year and fourth quarter of 2008. more »

Wincor World 2009: keen interest in combined solution portfolio

Wincor World 2009, which was held in Paderborn from January 20 to 22, has once more proven to be the place where experts from retail banking and retailers gather, even in times of economic crisis. more »

Motorola Honored with Prestigious iF Product Design Award

Motorola Inc. announced it has been recognized with one of the world’s foremost industrial design honors, an iF product design award. more »

Parliament online this week: the key issues

The EU’s antiterrorism coordinator, Gilles de Kerchove, and Interpol representatives, will brief MEPs on Thursday about progress in combating terrorism. more »

Tesco, Poland's leading retail enterprise, awards service contract to Wincor Nixdorf

The Tesco retail chain in Poland has chosen Wincor Nixdorf to maintain its 4,600-strong estate of POS systems and servers from different vendors. more »

Gemalto Provides Kingdom of Bahrain with Additional One Million New-Generation e-ID Cards

Gemalto, the world leader in digital security, announces it will deliver an additional one million of its latest generation electronic ID cards for citizens and residents of the Kingdom of Bahrain. more »

China's Largest CAD/CAM Software Developer Selects Aladdin HASP SRM

CAXA increases sales and reduces costs with Aladdin HASP SRM. more »

OPT chooses Bull to launch innovative telecommunications services

Bull extends the deployment of Comptel Dynamic OSS, at the heart of the telco's information systems. more »