Researchers at the University of Twente in the Netherlands report that the LOIC (Low Orbit Ion Cannon) software used in pro-Wikileaks Anonymous attacks discloses the identity of the user.
If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems. The current attack technique can therefore be compared to overwhelming someone with letters, but putting your address at the back of the envelop. In addition, hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least 6 months. This means that hacktivists can still be traced easily after the attacks are over.
Here's a PDF with details on the report. Attacks by "Anonymous" WikiLeaks proponents not anonymous utwente.nl (via Slashdot)
Google [Alphabet Inc.] will soon charge hardware companies up to $40 per device to use Google apps, under a new licensing plan that will replace one struck down by the EU earlier this year as anti-competitive, reports Reuters.
Facebook is working very hard right now to prove it can be trusted to protect users from malicious fake news, political disinformation, and cyberattacks intended to throw the 2018 midterms. What Facebook is not doing: providing details.
The highly secretive Silicon Valley-based data company Palantir is reported to be considering an initial public offering.
Speed reading isn’t just an innate skill possessed by a lucky few. Anyone can learn to speed read, and the benefits are endless. The brain can process more information than most people have time to soak up, but you can make that time now with the 2018 Award-Winning Speed Reading Bundle. The first half of […]
Sure, you could use the same old PowerPoint templates for your next business presentation. It’s not like you have bosses or investors to impress. Oh wait, you do? Time to augment that slideshow with Slideshop – the presentation tool that can individualize your pitch while saving you time. Compatible with PowerPoint, Keynote and Google Slides, […]
Multinational companies have used the no-nonsense methodologies of Six Sigma and Lean Six Sigma to oil a smooth-running operation for years. What is it? Six Sigma (and its offshoot, Lean Six Sigma) apply the principles of science to business, teaching managers to methodically target waste, maximize output and streamline the flow from producer to consumer. […]