Tag: DDoS

Tech Time Warp
Tech Time Warp: Why the Panix attack was a wake-up call

Tech Time Warp: Why the Panix attack was a wake-up call

In this week’s Tech Time Warp, we take a look at how a work emergency is never good news—and when notice of it comes late on a Friday afternoon, it’s even worse. Especially when the news is that your internet...

/ August 25, 2023
tech time warp
Tech Time Warp: How human error leads to July 1997 email outage

Tech Time Warp: How human error leads to July 1997 email outage

This week’s Tech Time Warp looks at how, in a world that’s so utterly reliant on the internet, service outages are hardly uncommon anymore, whether they’re the result of distributed denial of service (DDoS) attacks, like that which caused Microsoft...

/ July 21, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provide malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the...

/ May 11, 2022
DDoS “celebrates” 25th anniversary with a spike

DDoS “celebrates” 25th anniversary with a spike

The first documented widespread distributed denial-of-service (DDoS) attack occurred in 1996 when New York City-based internet provider, Panix, was attacked. The New York Times described it: Beginning Sept. 6 and continuing through at least last Tuesday, a hacker intent on shutting...

/ May 12, 2021
Seven key ways to defend a network from fatal DDoS attacks

Seven key ways to defend a network from fatal DDoS attacks

Distributed Denial of Service Attacks (DDoS) are much different than what they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, with the idea of overwhelming it...

/ November 3, 2020
When throttling is acceptable

When throttling is acceptable

I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...

/ September 2, 2019
Tech Time Warp: Code Red worm puts users on high alert

Tech Time Warp: Code Red worm puts users on high alert

Following a month of DDoS attacks and security bulletins, computer users were on high alert Aug. 1, 2001, as they waited to see whether the Code Red Worm would reappear to wreak more havoc.

/ August 3, 2018 / 2 Comments