Tulip Systems Inc., the world renowned high bandwidth and broadcast stream hosting service US corporation was under repeated cyber attacks aimed at disrupting web services during the Georgia-Russia standoff few months ago. The promoters of Tulip are Georgian expatriates and this has enabled Tulip to work on many internet initiatives in Georgia. Tulip revealed that all the cyber attacks were traced back to originate from IP addresses in Russia. Mr.Tom Burling of Tulip said: ”What needs to be recognized is that Russia is invading United States businesses as well as sovereign foreign nations” .

Cyber attacks on US companies are increasing despite the best efforts to deflect such attacks by the corporates. GoDaddy.com, the well known domain name register and web hosting provider was hit by a distributed-denial-of-service (DDoS) attack recently, which affected thousands of hosting customers. This was initially thought to be an ‘outage’, but later GoDaddy.com later admitted that it was a cyber attack. Another attack reported was on the USAjobs.gov, website run by Monster. About 146,000 users of the website had their personal information stolen, except social security numbers that were encrypted in the database.

The US society is completely dependent on cyberspace, such as banking, investments, shopping, travel, utilities, news, work and personal communications, etc. Even at the governmental level, all the various organs, organizations, utilities, etc. are dependent on their cyber networks for carrying out their mandated tasks. Needless to say, such extensive and widespread use of cyberspace in US also provides opportunities for cyber attacks.

Apparently, some three million attempts of infiltration into Pentagon computer networks are defeated almost on a daily basis. Despite such constant vigil, attacks do get in and paralyze networks. Only in November last Defense Department computers were compromised by attacks that originated from Russia which apparently affected computers in combat zones, especially in Iraq and Afghanistan. Such attacks highlight the increasing danger and potential importance of computer warfare.

Cyber attacks can take many forms such as defacing a website, stealing valuable data or crippling a network controlling operations. These cyber attacks are targeted at corporate assets and services, such as web, email, database, etc., all of which contain corporate information and are used for e-commerce services. These important applications can be bombarded with spurious service requests and the DDoS attacks will disrupt business with severe deficiencies in communications, transactions, productivity and profitability. Such attacks can cost the corporations significant amount of money in goods, reputation and time.

Risk assessment is an important technique for information security. It is also important to have formal policies and procedures to safeguard information. However, such policies & procedures are non existent in many corporations, though the situation is changing slowly for the better. Unconventional methods are also being used for obtaining cyber security. For example, Microsoft hired hackers to test the Vista security.

Cyber attacks are treated as serious federal crime in the US under the National Information Infrastructure Protection Act of 1996. Conviction will result in imprisonment for a number of years and fine. Not just US, several other nations have similar stringent laws. However, detection and conviction is difficult as cyber attacks can come from across borders and with fictitious identities. It is not expensive to organize and implement attacks by the criminals. Cyber attacks as a means of crippling governments have not yet reached alarming proportions, but the prospect of such concerted and coordinated attacks in the future can not be wished away. And the world community will have to put their heads together to come up with effective strategies to counter these malicious attacks.

Explore More

How To Bypass Ownership Permission

Conditions: ————– 777 Directory What Is This: ————– You Uploaded Shell With With “NoBody” Permission Let’s Say You Browse To Another Folder Which Is 777 But All Files Are 755

Stealth, dangerous and still un-armed!

W.32Downadup.C, the third variant of the Conficker virus is more aggressive and trying to be stealth by disabling the security software installed on the machine. The new variant is focusing

Yahoo password recovery method

A friend of ours asked us “is it possible to retrieve yahoo password”. On further discussion we found out that he was waiting to get the password from an old