Skip to main content

Family Tech: DOS attack reminds us to be prepared - October 28, 2016

I hate it when the world mocks a recent column. Two weeks ago I extolled the virtues of the Internet of Things devices. This week, they helped cripple large parts of the Internet for the better part of a day.

On Friday the 21st, users were unable to reach sites like Twitter, Pinterest, CNN and many others. These sites all used the DYN Corporation to manage their DNS services.

When you type in an Internet address, like InsideNova.com, the request is first routed to a Digital Name Service server. There the name is found in a database, and a number is returned to your browser. That number tells your browser where to find the actual InsideNova web server on the net.

If that DNS server is down, then your browser will not find the content you are seeking.  

 DYN manages the DNS servers for the companies that became unreachable Friday. DYN was attacked by an unknown entity using a denial of service attack, or DOS for short.

In a DOS attack a site is flooded with traffic, overwhelming its servers so they cannot do their job. Think of a million mailmen all trying to put mail into your mailbox at the same time. Not all of them could stuff mail at the same time, and the little box would be overwhelmed.

Friday’s DOS came in two separate attacks from an astonishing tens of millions of Internet addresses. By attacking this one site, the attacker was able to hobble many sites instead of just the one they were attacking.

If just one computer tried to flood another in a DOS attack, it would be easy to know where the attack was coming from and block it. To avoid detection DOS attackers created botnets to infect PCs. They might trick you into opening an email attachment that would install the botnet or sneak it onto a PC another way.

A lot of times when your computer is infected by a virus, that virus did not harm your PC or even copy information from it to another PC. Instead it became partially under the control of a bad actor. When they wanted to mount a DOS attack, they could order their army of botnets on PCs like yours and mine all over the world to begin flooding the target site with traffic.  If you and I were alert, we might notice our outgoing internet traffic was higher than it ought to be, but few of us would notice.

This is where Internet of Things devices enter the picture. When we began adding home automation hubs, internet connected lights, thermostats, sensors etc., the manufacturers did not pay as much attention as they should have to the security of those devices.


Read the rest at FamilyTechOnline.com


Comments

Popular posts from this blog

Notes Folder : My new note taking system

I'm in the process of moving to a new way to keep my notes. It would be best to make a separate post on my long time notetaking app, Evernote, and how it now disappoints me.  Bottom line, I no longer trust the company behind Evernote since it was acquired. My first inclination was to finally look at alternatives. like Notion, Joplin, Obsidian, etc. I was not enamored with any of them, so I gritted my teeth and stayed with Evernote. The situation made me think about how I use Evernote. To keep up additional posts on this topic, search on the tag Notes Folder Updates : January 24, 2024 and in updates noted here. Most of the things I store are quick notes, lists, online receipts for online bills, that sort of thing; kind of an online file cabinet if you will. If I were a doctoral student though I could see storing PDFs of papers and research materials.  If were working on a large project, then plans, communications etc. would all be there. Back when I began using Evernote way b...

Recording your own notes with Google Voice

Note :   April 2016:  Frankly I don't know if this works anymore.  It is 7 years old. I stopped using this when Google Now became useful on my phone, and I could dictate reminders using it. I found a way a while ago to use Google Voice to record a personal note, transcribe it, and email it to me. A recent Lifehacker post "Five Things We'd Like to See in Google Voice" lists that need as their #5 request, so I realized what I'd figured out is not common knowledge. In GV's Contacts, create a Group "Special Transcription" To avoid listening to my standard voice mail when I call, I recorded a short voice mail greeting for this group simply saying "Record note now" I added a contact with my own cell phone number as the only number, and made it the sole member of this group. In GV's phone settings, I edited the settings for my cell phone. In the section "Direct access to voicemail when calling your Google number from th...

Ten Years of Evernote

This blog post was set to publish exactly as the day begins on Tuesday, July 31, 2018. That is ten years to the day after my first Evernote  post. With my second note, I was already getting down to business; recording the agreement I'd come to on the phone on a minor business matter. My affection for Evernote has not dimmed since that day ten years ago. Since then, I've accumulated about 7.8 new notes a day. Ironically, I have needed to pull up only a few notes a year. Yet, when I need them, I need them badly and am glad to have Evernote all over again. My philosophy of what to capture is simple : If you encounter something you might remotely want to see again, it goes into Evernote. from a blog post June 1, 2015 I've written here about Evernote than any other topic.  Even wrote a now horribly out-of-date book. Don't get me wrong. If something better comes along that imports my Evernote notes well, I can be enticed to move.  But in t...