Supported by
Daily Report: Hackers Have New Tools to Bring Down Websites
Some people are old enough to remember when websites went down because of incompetence, not malicious intent.
The good news is that the software that runs big websites has improved significantly over the years. There are now tools that can spread traffic loads among thousands of servers and other improvements, so we have come to expect that our favorite sites will stay up all the time.
The bad news? Hackers also have new tools to take those sites down. Friday morning, Dyn, a New Hampshire company that hosts critical portions of the internet’s infrastructure, was hit with so much traffic that its servers were overwhelmed. The attack caused sporadic disruptions at sites like Twitter, Reddit and The New York Times.
It is too early to say who did it. But security experts are concerned about how they did it: using a vast, co-opted collection of internet-connected devices, like cameras and perhaps even baby monitors, in what is called a distributed denial-of-service attack. Experts have been warning for some time that everyday objects with internet connections, the so-called internet of things, could be used in such an attack.
It appears those warnings have largely been ignored. And it is not clear how the attacks can be prevented in the future, other than making sure that everything in your home or your car or your office that is connected to the internet has a unique password.
A Guide to Digital Safety
A few simple changes can go a long way toward protecting yourself and your information online.
A data breach into your health information can leave you feeling helpless. But there are steps you can take to limit the potential harm.
Don’t know where to start? These easy-to-follow tips and best practices will keep you safe with minimal effort.
Your email address has become a digital bread crumb that companies can use to link your activity across sites. Here’s how you can limit this.
Protect your most sensitive accounts by creating unique passwords and adding extra layers of verification.
There are stronger methods of two-factor authentication than text messages. Here are the pros and cons of each.
Do you store photos, videos and important documents in the cloud? Make sure you keep a copy of what you hold most dear.
Browser extensions are free add-ons that you can use to slow down or stop data collection. Here are a few to try.
Advertisement