'Iranian Cyber Army' uses DNS hacking to bring down Twitter

Popular microblogging service Twitter went down for several hours on Thursday as hackers claiming to represent the "Iranian Cyber Army" disrupted the site's DNS records and replaced the fron

7/7 DDoS: This Year’s Most Malicious Cyberattack

It has been indicated that 2009's most malicious cyberattack is the 7/7 DDoS cyber attack. In the 7/7 DDoS cyber attack, unknown hackers were able to mass produce zombie PCs without the knowledge of t

Twitter filters malicious weblinks

Author: Warwick Ashford Posted: 10:40 04 Aug 2009
Topics: Twitter Twitter has introduced a filter to stop users posting links to malicious websites, security firm F-Secure has revealed in a blog posting.

"Twitter hasn't announced this, but we just noticed that they have now started filtering Tweets that contain links to known malware sites," the blog posting said.


Denial-of-service attack downed Gawker Media

Hackers launched a distributed denial-of-service (DDOS) attack that sporadically downed popular blog network Gawker Media over the weekend and on Monday, the company confirmed in a blog post early Tuesday morning.

When CNET News spoke to Gawker Media representatives on Monday, they were not yet sure what was causing the outages but had not ruled out malicious behavior.


DDoS Trojan Spread from Domestic Source

Korea IT Times The Global Source for Korean IT Industry NewsTuesday, July 28, 2009What is now being called the 7.7 DDoS Attack, which paralyzed major websites in Korea on July 7, is confirmed to have

AT&T unblocks 4chan after DDoS scare ban

By John OatesGet more from this author


Kaspersky reveals price list for botnet attacks


12:43 23 Jul 2009

US, Korean DDoS Attacks originated from United Kingdom

A Vietnamese security researcher said they discovered the IP address of the master server which was used in attacking the United States and Korean government agency.


North Korea: Culprit in DDoS Attacks?


By Bill Brenner , CSO , 07/08/2009

PCs Used in Korean DDoS Attacks May Self Destruct


There are signs that the concerted cyber attacks targeting U.S. and Korean government and commercial Web sites this past week are beginning to wane. Yet, even if the assaults were to be completely blocked tomorrow, the attackers could still have one last, inglorious weapon in their arsenal: New evidence suggests that the malicious code responsible for spreading this attack includes instructions to overwrite the infected PC's hard drive.