Network Security - Page 8 - Results from #70 | LinuxSecurity.com

Network Security

Discover Network Security News

DDoSing a Cell Phone Network

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers and at least one transaction with HLR/AuC is required for every single phone call or data session.

The downfall of hacker collective Antisec

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hacker chronicler Quinn Norton spent months in 2011 and 2012 talking to members of the hacktivist collective Antisec, the division of Anonymous responsible for the leaked corporate emails that earned Jeremy Hammond a 10-year prison sentence.

Three types of DNS attacks and how to deal with them

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. The changes forced one site offline and caused problems for the others. Here are three ways such attacks happen, and how they can be mitigated

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.