SCO attacks keep coming back

Tuesday, 16 December 2003, 3:57 PM EST

After the attacks largely abated Friday, they restarted at 3 a.m. PST Saturday until 11 p.m. Sunday, said Blake Stowell, a spokesman for SCO. The deluge of data, known as a denial-of-service attack, restarted Monday morning, and the company's Web site continues to be inaccessible.

"At this point, we are continuing to use the same tactics: keeping in contact with our Internet service provider and the U.S. Secret Service," Stowell said.

The Web site and file servers have been inaccessible for five of the last seven days. If such attacks continue, the company could find itself unable to communicate with customers.

Groklaw, a legal analysis site that has been critical of SCO, cast doubt on the company's claims that it can't do anything about the attack. Such attacks can usually be largely mitigated by buying up more bandwidth and connecting through Internet service providers that have special technology aimed to defeat the assaults.

[ Read more ]

Related items




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //