Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
10 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
 

BlueStreak

(8,377 posts)
1. In other news, productivity experts reported a sudden 65% gain in productivity
Fri Oct 21, 2016, 05:25 PM
Oct 2016

today as Twitter was down.

 

Coyotl

(15,262 posts)
3. Unless a malware virus was spread everywhere with a trigger date.
Fri Oct 21, 2016, 05:55 PM
Oct 2016

Your computer could be one of the problems without you even realizing it given a certain scenario.

 

Wilms

(26,795 posts)
6. I'm learning that there are a lot of computer engineers, just as with doctors.
Fri Oct 21, 2016, 06:30 PM
Oct 2016

And that you don't call a podiatrist for if you are having eye trouble.

Is it not reasonable to assume this is a distributed attack that may involve many devices, be they PCs or phones, or IoT equipment?

So if one of the places you trace it to is my security camera, then what??

Foggyhill

(1,060 posts)
9. Command and control are the ones activating your embedded bot in your security camera
Fri Oct 21, 2016, 09:37 PM
Oct 2016

- You go after companies for their shitty security practice, of IOT objects, maybe the government will need to enact standards

- You trace the commend - control nodes and hope they lead you back to a real person eventually. Often you your more apt at finding were the attack originates, and what state actors if any are involved, than those specifically involved.

- But, such an attack generally leaves many traces and leads that can lead to setting traps to eventually catch the culprits. It could take years to do so. If the hack originates with a state actor, knowing who is responsible only means the cyber cold war escalates.
 

Wilms

(26,795 posts)
10. OK. So we understand it's not so simple.
Fri Oct 21, 2016, 09:40 PM
Oct 2016

Ironically, just a few days ago I was reading about IoT device vulnerability for this exact kind of thing.

I'm interested in some of those devices, but I don't want to become a part of the problem.

Latest Discussions»Retired Forums»2016 Postmortem»Denial of service attack ...