New cyber-assault methods pop up

Published: 31 December 1999 y., Friday
As the pre-Y2K hype enters its final phase, computer watchdogs have identified twonew techniques for bringing Internet sites down: One of the denial-of-service attacks is nicknamed TFN2K, the other is called the "Mac Flood Attack." Neither of them is directly related to the Year 2000 computer bug itself, but the failures they cause could be misinterpreted as New Year_s glitches. TFN2K is a variant of a previously reported denial-of-service attack known as TFN or Tribe FloodNet . The attacker can make it look like data requests are coming in from multiple sources - which makes it harder to track down the source of the attack.TFN2K adds another twist by intentionally sending data errors "designed to crash or introduce instabilities in systems," the center said. CERT advised system administrators to follow industry guidelines to guard against denial-of-service attacks, and to install filtering software that recognizes when Internet traffic is coming from bogus sources. The second attack strategy targets Apple Macintosh computers running the MacOS 9 operating system with full-time connections to the Internet (under some conditions, systems using MacOS 8.6 also may be vulnerable). John Copeland, a computer engineering professor at the Georgia Institute of Technology, reported that an attacker could send relatively small amounts of fake data in such a way that the Macs would be triggered to send larger transmissions in reply.
Šaltinis: MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Lawmakers Call for Cybersecurity Enhancements

As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry and Zoe Lofgren are focusing on the state of U.S. cybersecurity more »

New Worms Sniff For Passwords

Security firms are warning of a new series of Sdbot worms that install a "sniffer" component to steal passwords from unsuspecting users more »

Sender ID in Limbo

Microsoft's undeclared patent claims on Sender ID technology is holding up adoption of the e-mail authentication specification more »

search.lt news

search.lt presents newest links more »

Microsoft Wins 'Tabbed Browsing' Patent

Microsoft has been granted a patent from the U.S. Patent and Trademark Office on a process known as tabbing through a Web page in order to find links more »

search.lt news

search.lt presents newest links more »

UzJilSberBank Introduces Plastic Cards at AGMK

UzJilSberBank (Uzbek housing construction bank) completed a project of introduction of plastic cards at Almalyk Mining and Smelting Combine more »

Copyright Law and Data Extraction

Recent decisions suggest that U.S. courts are more likely to protect an online database if the work involved was tilted towards the compilation of data itself as opposed to the technology used to gather it more »

Florida Says E-Vote Primary A-OK

Touch-screen machines brought in to replace the punch-card ballots at the center of the 2000 presidential fiasco appeared to work smoothly in primary voting Tuesday more »

Hackers continue to experiment with 64-bit viruses

Shruggle virus could be 'a taste of things to come', warn experts more »