Home Business IT Security Cyberattack highlights need for vigilance says peak body

Cyberattack highlights need for vigilance says peak body Featured

The reported Distributed Denial of Service (DDoS) attack on internet spam-fighting group Spamhaus highlights the the fragility of the internet, according to Australia’s Internet Industry Association.

As we reported earlier today, a DDoS attack has slowed down the internet and threatened many of the core services that World Wide Web is built on, and Australia's peak internet group is callin for vigilance in protecting core server infrastructure from these types of attacks.

DDoS attacks are used to target certain Internet websites and servers with huge volumes of traffic, which can ultimately bring those servers and the internet traffic flowing through them to a grinding halt.

John Ellis, Enterprise Security Director for APJ, representing IIA Member, Akamai Technologies, said "The internet is an inter-network of separately managed networks, that are connected together through a series of hierarchal relationships between network provider."

"Those who attacked Spamhaus were smart in understanding these relationships and after initial efforts to disrupt the availability of the Spamhaus website failed, targeted the upstream network providers. These attacks were designed to 'suffocate' where many of the networks meet at what are known as Internet Exchanges (IXs).

"By targeting these internet exchanges, the Spamhaus attackers where able to create significant amount of congestion at key points of the Internet. This resulted in significant portions, and users of the internet experiencing performance issues.

"Whilst the Internet Exchanges were able to reroute around these congestion points, the attack further highlighted additional vulnerabilities in design and implementations of networks on the internet."

At this stage there have been no reports of this attack having a direct impact on Australian Internet user devices, however Patrick Gilmore of Akamai Technologies said the attack was so large that online bystanders had been hit as well.

Home users could experience slower internet or be subjected to unwanted emails.

"This not only highlights the need for service providers to be vigilant in relation to their core Internet server security but also the importance of initiatives such as the Internet Industry Association code, which provides a mechanism for ISPs to alert their customers should such attacks result in the dissemination of malicious software that may affect an end-user's device", said Chief Executive of the IIA Peter Lee.


Does your remote support strategy keep you and your CEO awake at night?

Today’s remote support solutions offer much more than just remote control for PCs. Their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards.

It is imperative that service executives acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support.

Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

To find out all you need to know about using remote support to improve your bottom line, download this FREE Whitepaper.


David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun.