E-Learning-Inclusivo (Mashup)
1.1M views | +15 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | E-Learning-Inclusivo (Mashup) | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/




Via Gust MEES
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Hackers turn 162,000 WordPress sites into DDoS attack tools

Hackers turn 162,000 WordPress sites into DDoS attack tools | E-Learning-Inclusivo (Mashup) | Scoop.it
Legitimate sites forced to aid criminals' illicit botnet operations


Hackers have hijacked more than 162,000 legitimate WordPress sites, connecting them to a criminal botnet and forcing them to mount distributed denial-of-service (DDoS) attacks, according to security firm Sucuri.


Sucuri CTO Daniel Cid said the company uncovered the botnet when analysing an attack targeting one of its customers. Cid said Sucuri managed to trace the source of the attack to legitimate WordPress sites.

"The most interesting part is that all the requests were coming from valid and legitimate WordPress sites. Yes, other WordPress sites were sending random requests at a very large scale and bringing the site down," read the blog.



Via Gust MEES
Scooped by juandoming
Scoop.it!

Attackers trick 162,000 WordPress sites into launching DDoS attack

Attackers trick 162,000 WordPress sites into launching DDoS attack | E-Learning-Inclusivo (Mashup) | Scoop.it
Technique allows lone attacker hidden in the shadows to wage crippling attacks.
No comment yet.