NAVIGATION MAIN MENU

COMPENDIUM LIBRARY/TWITTER MONITOR
VIDEO GALLERY
Economic News
Newsbrief Archives
Democrat Leadership Twitter and Realtime Feeds
Cabinet twitter and realtime feeds
North America weblog
International weblog
Democrats twitter directory
Latest Government Jobs and Public Tenders
Jobs Matrix
Global Travel Information
Pop Entertainment Forum
Start Portal


Please make a donation to support upkeep of the daily news journal, back archives, twitter feeds and the compendium library.










Denial-of-Service Malware Campaign

Daily newsbrief journal for January 2012, also see http://www.usdemocrats.com/brief for a global 100-page perpetual brief and follow twitter @usdemocrats


Denial-of-Service Malware Campaign

Postby admin » Wed Jan 25, 2012 5:05 am

Denial-of-Service Malware Campaign

Original release date: January 24, 2012 at 5:35 pm
Last revised: January 24, 2012 at 5:35 pm


US-CERT is aware of public reports of ongoing distributed
denial-of-service attacks against entities in the government and
private sector. According to the reports, these attacks are being
attributed to the hacker group Anonymous.
US-CERT encourages users and administrators to do the following to
reduce the risk associated with this and other malware campaigns:
* Do not open attachments in email messages from unknown sources.
* Install anti-virus software and keep virus signatures files up to
date.
* Refer to the Recognizing and Avoiding Email Scams (pdf) document
for more information on avoiding email scams.
* Refer to the Avoiding Social Engineering and Phishing Attacks
document for information on social engineering attacks.
* Refer to the Recovering from Viruses, Worms, and Trojan Horses
document for additional information on how to recover from
malware.
* Refer to the Continuing Denial of Service Threats Posed by DNS
recursion (v2.0) (pdf) document and Understanding
Denial-of-Service Attacks document for additional information on
denial-of-service attacks.

US-CERT will provide additional information as it becomes available.

Relevant Url(s):
<http://www.us-cert.gov/cas/tips/ST04-014.html>

<http://www.us-cert.gov/reading_room/DNS-recursion033006.pdf>

<http://www.us-cert.gov/cas/tips/ST05-006.html>

<http://www.us-cert.gov/reading_room/emailscams_0905.pdf>

<http://www.us-cert.gov/cas/tips/ST04-015.html>

====
This entry is available at
http://www.us-cert.gov/current/index.ht ... activities
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am

Return to January 2012

Who is online

Users browsing this forum: No registered users and 3 guests