ITsecurity
twitter facebook rss

DOS challenges with ITsecurity.co.uk

Posted by Sorin Mustaca on October 17, 2016

We were faced with a problem which was at first out of our control: “somebody” is creating, probably without knowing, a denial of service on this website. The consequence was that it was “consuming” the accesses to the database behind this WordPress site. The ISP hosting the website limits the accesses to 50K an hour. More accesses […]

DDoS – we got hit this week

Posted by Kevin on March 5, 2016

We got hit by DDoS this week. It came in waves. The site was down for at least six hours with each wave, which seemed to come every 20 hours or so. This is what it did to our page views. Of course it didn’t hurt us financially because ITsecurity.co.uk is a labour of conscience, […]

ITsecurity Daily News: 09/02/2014

Posted by Kevin on September 2, 2014

The ITsecurity daily security briefing: Tuesday, September 2, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News How were the celebrity selfies stolen? Well, we don’t know. It […]

ITsecurity Daily Briefing: 08/15/2014

Posted by Kevin on August 15, 2014

The ITsecurity daily security briefing: Friday August 15, 2014. News Papers/Reports WebThings Events M&A Alerts News Gameover botnet being rebuilt as NewGOZ Now domain generation rather than P2P. “…how long will the threat actor focus on rebuilding their botnet before they return to focusing on stealing money?” Arbor Networks: http://www.arbornetworks.com/asert/2014/08/five-sinkholes-of-newgoz/ AB Acquisition LLC Confirms Incident […]

Does DOS extortion break the security risk management rule?

Posted by Kevin on June 15, 2014

We are exhorted to bring risk management principles into the infosecurity practice. In classic risk management we can accept, mitigate or transfer risk. In infosec, this roughly translates to doing nothing, using security practices and systems for defence, or employing a third party security services provider (SSP) to provide protection for us. It is in […]