Tags BGP hijacking
‘Cyber Storm’ drill for critical infrastructure focuses on corruption of key IT services
It is the subtle manipulation of these IT services that advanced hacking campaigns often exploit in the real world.
Open-source tool aims to curb BGP hijacking amid Chinese espionage concerns
Perhaps the best known example of BGP hijacking occurred in November when millions of IP addresses aimed at Google were instead sent to a state-controlled telecom in China.
DHS wants help to identify, attribute major web outages
The Department of Homeland Security wants help identifying, attributing and combatting major internet disruptions. And it will pay: $12 million to $15 million over three years for half a dozen research projects.