Web Hosting News

  Home arrow Web Hosting News arrow Page 3 - How Resilient is the Internet?
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING NEWS

How Resilient is the Internet?
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1
    2007-02-28

    Table of Contents:
  • How Resilient is the Internet?
  • Attack and Defense
  • Hackable Majority
  • Securing the Internet's Future

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    How Resilient is the Internet? - Hackable Majority


    (Page 3 of 4 )

    Danny McPherson, chief research associate for Arbor Networks, an attack detection company, noted that "These attacks weren't that substantial." He said that "This was a 2G to 3Gbps attack," not as bad as the 22G to 25Gbps attacks his company saw in 2006. "They were pretty ugly, and the scale of those attacks was pretty large." Still, even the smaller attack that happened February 12 "could take most enterprises offline pretty easily."

    There are other forms of attacks that businesses also need to be concerned about. Acunetix, a web site security company, has scanned 3,200 sites over the last year. It discovered that about 70 percent of these web sites include medium- or high-risk vulnerabilities that open them up to being hacked. Once inside, hackers could use the vulnerabilities to steal sensitive information.

    So what kinds of vulnerabilities did the survey turn up? They included everything from major problems such as SQL injection and cross site scripting to relatively minor ones, like local path disclosure or directory listing. The average web site scanned by Acunetix included 66 vulnerabilities, which means that the company spotted more than 200,000 items that were security risks on 3,200 sites.

    Not everyone believes this dire figure. Paul McNamera of NetworkWorld forwarded Acunetix's release to Joel Snyder, a senior partner at Opus One, an information technology firm. Snyder was willing to bet $1,000 that, out of ten randomly chosen sites on Acunetix's list of 3,200 scanned, it couldn't break into as many as three of them and steal sensitive information. Acunetix raised the stakes in the challenge by offering to scan Network World's site and trying to break in; as of this writing, that is where the matter stands.

    But whether or not it's true, it does raise the point that many web sites are vulnerable in ways the Internet as a whole is not. Indeed, the very fact that there are botnets to make denial of service attacks proves it - because there would not be zombie computers if hackers did not break in or users were more diligent about keeping their computers clear of malware. It's not easy, but - as Acunetix was trying to illustrate - this kind of computer hygiene is important, and is still not being treated with the seriousness it deserves.

    More Web Hosting News Articles
    More By Terri Wells

    WEB HOSTING NEWS ARTICLES

    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap