Tag Archive for: answers

Information Regulator wants answers from Liberty over data breach

  1. Information Regulator wants answers from Liberty over data breach  Eyewitness News
  2. Liberty share falls after data breach  Business Day
  3. Liberty ‘won’t be fined’ for big data breach  HeraldLIVE
  4. Full coverage

data breach – read more

Senators want answers on risk of nuclear power plant hacks – CNET


CNET

Senators want answers on risk of nuclear power plant hacks
CNET
On the heels of reports of foreign hackers trying to access computer networks at U.S. nuclear power plants, Massachusetts Sen. Edward Markey on Monday wrote a letter (PDF) to five federal agencies asking for more information about the attacks

and more »

computer security news – read more

Yahoo hack: EU data watchdogs demand answers about Yahoo … – IT PRO


IT PRO

Yahoo hack: EU data watchdogs demand answers about Yahoo …
IT PRO
In a letter delivered to the US email provider last Thursday, the Article 29 Data Protection Working Party (WP29) described the 2014 data breach, which only …

and more »

flame malware – read more

Answers to ‘Is the internet broken?’ and other Dyn DDoS questions

The massive DDoS attacks that took down internet address-translation service Dyn and its customers last week raise a lot of need-to-know questions about the overall security of online infrastructure and its performance.

While the attacks were ultimately mitigated and have subsided, the means for carrying out others are still viable and could crop up at any time with other targets. Here are some questions and answers that address what happened, how it happened, whether it could happen again and what the consequences might be.

Is the internet broken?

No, or at least not any more than it was before. It’s made up of a system of independent vendors and institutions working cooperatively to provide access to sites around the world. Each works in its own best interests but also cooperates with the others to make the system work for everybody. Like any such system, it’s got flaws and weaknesses. The Dyn attackers targeted some of these vulnerabilities and exploited them for maximum effect.

To read this article in full or to leave a comment, please click here

Network World Tim Greene