Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Megaupload Protest Attach Disrupts Major Sites

LogRhythm : 23 January, 2012  (Technical Article)
The FBI and America's Motion Picture Industry Association sites were the target of an attack protesting against the closure of file sharing site
Last night the FBI and The Motion Picture Association of America were amongst a range of public and private organisations that suffered major website disruption in protest to US officials shutting down Megaupload, one of the internet’s largest file-sharing websites. Hacking group Anonymous has claimed responsibility for the attacks.

Ross Brewer, vice president and managing director for international markets, LogRhythm, has made the following comments:

“If it’s this easy for hacktivists to take down the websites of security-conscious law enforcement agencies like the FBI, then surely no organisation can afford to be complacent about their cyber security? Anonymous’ methods, a series of Distributed Denial of Service (DDoS) attacks that overwhelm web servers, may be crude when compared to more sophisticated techniques, but they are certainly effective, and provide this hacking collective with the publicity they crave.”

“All organisations that might be at odds with the political causes supported by groups like Anonymous need to make sure they are prepared to face the resulting backlash. IT has a big role to play and it is essential that Protective Monitoring is in place to provide the actionable intelligence required to protect assets. By collecting and analysing 100 percent of logs generated by networks, and monitoring perimeters in real-time, this approach enables organisations to decipher patterns in seemingly unrelated incidents and detect any malicious agents that may be probing systems for weaknesses.”

“By using this data to make informed decisions as to where vulnerabilities may occur, Protective Monitoring platforms enable organisations to reallocate resources to remediate threats before they have a chance to achieve their goals.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo