Tags BGP hijacking

‘Cyber Storm’ drill for critical infrastructure focuses on corruption of key IT services

by Sean Lyngaas

It is the subtle manipulation of these IT services that advanced hacking campaigns often exploit in the real world.

Open-source tool aims to curb BGP hijacking amid Chinese espionage concerns

by Jeff Stone

Perhaps the best known example of BGP hijacking occurred in November when millions of IP addresses aimed at Google were instead sent to a state-controlled telecom in China.

DHS wants help to identify, attribute major web outages

by Shaun Waterman

The Department of Homeland Security wants help identifying, attributing and combatting major internet disruptions. And it will pay: $12 million to $15 million over three years for half a dozen research projects.

TwitterFacebookLinkedInRedditGmail