Category

Malware and DOS attacks

NaWas Join LINX to Assist UK Growth Ambition

By | General, LINX News, Malware and DOS attacks, News

The London Internet Exchange (LINX) welcomed new member network NaWas to their community and peering LAN in London this month.

The Dutch born not-for-profit network have been specialising in DDoS prevention services for six years and are a founder member of The NBIP (Dutch National Internet Providers Management Organization). 

The NBIP offers small, medium and large Internet and VoIP providers an on-demand service to combat DDoS attacks in the Netherlands and the rest of Europe. This enables individual ISPs or VoIP providers to avoid large investments and access more powerful weapons to fend off DDoS attacks. The organisation now protects more than 42% of Dutch Internet domains.

Already present at the Amsterdam Internet Exchange, NaWas made the decision to join LINX as part of their wider business strategy for growth in the UK market.

Frank Dupker, European Network Manager for NaWas says:

“We are so pleased to be a part of the LINX community as part of our wish to grow our network in UK to fight DDoS. Our services are very economical and consisting of a flat fee because of our non-profit community structure. Technical we have a multi-vendor line-up and offer best of breed scrubbing services. Being part of LINX community is important to grow new memberships from local ISP’s.”

NaWas attended the recent LINX Member Conference in London and found it really valuable, meeting the LINX team and the community.

“LINX107 was a great opportunity to present our vision and meet potential new members in UK and outside the country. Really a pleasure to be part of it, we definitely come back for other meetings.”

London is a key interconnection hub for global businesses and LINX is the largest Internet exchange in the UK with over 400 of their 900 member strong community being key UK networks.

 

ENDS

 

About NaWaS by NBIP

The Dutch National Internet Providers Management Organization (Nationale Beheersorganisatie Internet Providers, or NBIP for short) is a unique initiative of Internet providers that goes under the motto “Smarter and stronger together”. The NBIP is an independent non-profit organization that contributes to a safer Internet by jointly purchasing and operating expensive facilities that are only occasionally needed. A successful example of such facilities is NaWaS, an on-demand service to combat DDoS attacks in the Netherlands and the rest of Europe. Besides these services, NBIP is actively sharing knowledge with other interested parties as Universities, Governmental and Commercial in an effort of keeping an open and strong internet.

UK Government publishes Internet Safety green paper

By | Content Issues, Malware and DOS attacks, News

The UK Government has announced proposals for a voluntary levy on Internet companies “to raise awareness and counter internet harms”. The government has said that the levy would target issues such as cyberbullying, online abuse and children being exposed to pornography on the Internet.

The levy is one of a series of measures proposed in the Internet Safety Green Paper, which is the result of a consultation launched in February. The other measures include:

·       A new social media code of practice to require more intervention by social media companies against allegedly bullying, intimidating or humiliating content

·       An annual Internet safety transparency report, to help government track how fast social media companies remove material that has been the subject of a complaint

·       Demands for tech and digital startups to “think safety first” – prioritising features to facilitate complaints content removal as functionality that must be into apps and products from the very start

All the measures will be voluntary although the government has not ruled out legislating if companies refuse to take part. In remarks that will be of concern to Internet companies, the Culture Secretary Karen Bradley hinted that the government could change the legal status of social media companies, to deem them publishers rather than platforms, which could mean even greater regulation of their users’ content.

“Legally they are mere conduits but we are looking at their role and their responsibilities and we are looking at what their status should be. They are not legally publishers at this stage but we are looking at these issues,” she said.

The consultation will close on 7 December, and the government expects to respond in early 2018.

Leaked documents according to the Daily Mail and Wikileaks reveal that CIA has hacked Wi-Fi routers

By | International, Malware and DOS attacks, News

Leaked documents from activist group Wikileaks and as reported by the Daily Mail has shown that the Central Intelligence Agency (CIA) has hacked a number of routers and has converted them into devices used to snoop in on people’s conversations. The Daily Mail reports that the hacks have targeted 25 router models from manufacturers such as Linksys, DLink and Belkin. Furthermore, the Daily Mail cites the Wikileaks document as stating that the firmware could be expanded to affect a hundred or more devices if they are given only slight modifications.

The 175-page document was reportedly nicknamed “CherryBlossom” (CB for short) by the intelligence agency. The document described CherryBlossom as stating that: “The Cherry Blossom (CB) system provides a means of monitoring the internet activity of and performing software exploits on targets of interest”.

The firmware apparently works by converting the router into a “FlyTrap” that sends messages also known as “beacons” to CIA-controlled server nicknamed “CherryTree”. The FlyTrap sends information such as the router’s device and security information, which CherryTree logs into a database.

Devices that were protected with a weak or default password were highly susceptible to the firmware, the document from Wikileaks show.

The findings, if true, show the various problems associated with friendly governments taking the view that it is acceptable for intelligence agencies to compromise either security or privacy. The end result can only be the use of such mechanisms by actors with less than noble intentions – ranging from hostile governments to organised criminals to terrorists all the way down to script kiddies. This serves as a useful forewarning on the dangers of requiring ‘backdoors’ on encryption technology, together with the policy ramifications from the Investigatory Powers Act Technical Capability Notices.