Archive for the ‘Uncategorized’ Category

Malicious attacks hit IPv6 Internet

The next-gen Internet, still immature, is now a pathway for Net attacks, a study finds. Also, ideology has become the primary reason for DDoS attacks.

The idyllic byways of the next-generation IPv6 Internet now suffer an affliction previously limited to the mainstream IPv4 Internet: distributed denial-of-service attacks.

And worse, the still-immature IPv6 network is being caught with its pants down when it comes to repelling the DDoS attacks. That's the conclusion of Arbor Networks' latest annual study on the Internet's operational security, released today.Only 4 percent of survey respondents reported seeing IPv6 DDoS attacks--but it shows the IPv6 Internet is no longer free of them.

"This is a significant milestone in the arms race between attackers and defenders," Arbor Networks said. "We believe that the scope and prevalence of IPv6 DDoS attacks will gradually increase over time as IPv6 is more widely deployed."

For the moment, the volume is still relatively small--only 4 percent of survey respondents reported seeing IPv6 DDoS attacks--but that's a worrisome harbinger.

DDoS attacks use a swarm of computers to swamp a target machine on the Internet with traffic so it's unusable. Such attacks sometimes are launched from botnets of compromised computers for criminal reasons--but now the top cause is ideology such as that evident in Anonymous' coordinated protest attacks.

DDoS attacks send traffic to a particular Internet address, and today the vast majority of those addresses are handled by Internet Protocol version 4, or IPv4. IPv6, which vastly increases the number of possible addresses to deal with the fact that IPv4 is running out of them, is gradually becoming a reality as those with servers and network gear invest in the new network.

IPv6 isn't the main route for attacks, since it's still a relative backwater, but two problems make IPv6 particularly vulnerable. First, with the relatively immature network infrastructure, many network operators don't have the ability to scrutinize network traffic well enough to distinguish DDoS attacks from benign traffic. Second, gateways that link IPv4 and IPv6 must store lots of "state" information about the network traffic they handle, and that essentially makes them more brittle.

Arbor forecasts greater protections, though. "Twenty percent of respondents indicated that they have no plans to mitigate IPv6 DDoS attacks. We suspect that priorities within these organizations may evolve rapidly as IPv6 network traffic becomes more prevalent," Arbor said.

Investments in countermeasures are expensive--but so are DDoS attacks.

Survey respondents reported varying costs of dealing with a DDos attack: about $1,300 or $8,000 in two cases, $250,000 or $300,000 in two others, and $1 million to $1.5 million in two others. And of course there are other costs, for example when a business or government can't get work done or sell products.Survey respondents commonly reported 1 to 10 DDoS attacks per month, but some reported hundreds.

Powerful attacks the "new normal"
The study, a global survey of network operators such as Internet service providers, also finds that DDoS attacks have become more powerful, more sophisticated, and more routine. And the leading cause: ideological attacks such as launched by Anonymous after MegaUpload arrests.

"Ideology was the most common motivating factor for DDoS attacks in 2011, followed by a desire to vandalize," Arbor Networks said. The finding is "one of the single most important data points in this year's report, with major implications in terms of threat assessment, situational awareness, and continuity of operations for network operators, governmental bodies, law enforcement agencies, and end customers alike."

Although the top bandwidth of an attack decreased from 2010's 100 gigabits per second to 2011's 60 gigabits per second, it's increasingly common to see attacks that send tremendous traffic, Arbor said."During the survey period, respondents reported a significant increase in the prevalence of flood-based DDoS attacks in the 10Gbps range. This represents the 'mainstreaming' of large flood-based DDoS attacks, and indicates that network operators must be prepared to withstand and mitigate large flood attacks on a routine basis," the report said.

Growing DDoS sophistication
In earlier years, distributed denial-of-service attacks traveled by lower-level network protocols such as TCP (Transmission Control Protocol), which is used to ensure that data is successfully delivered across a network.

Now, though, attacks are moving to higher-level services such as HTTP (Hypertext Transfer Protocol), which is used to send Web pages to browsers; DNS (Domain Name Service) for translating text-based Internet addresses into their numeric equivalents; SMTP (Simple Mail Transfer Protocol) for sending e-mail; HTTPS for encrypted Web page communications; and voice over Internet Protocol (VOIP).

That's driven in part by new attack software. "HTTP GET and HTTP POST [two HTTP commands] were the most common application-layer DDoS attack vectors, more sophisticated mechanisms such as Slowloris, LOIC, Apache Killer, SIP call-control floods, SlowPost and HOIC are increasingly prevalent," Arbor found.

HTTP, used when a browser fetches a Web page from a server, is the most common application protocol for DDoS attacks, but other avenues include the standards for Net address lookups, e-mail, and voice communications.

This story was originally published on CNET News.

Stephen Shankland
Stephen Shankland writes about a wide range of technology and products, but has a particular focus on browsers and digital photography. He joined CNET News in 1998 and since then also has covered Google, Yahoo, servers, supercomputing, Linux and open-source software and science.

See the rest here:
Malicious attacks hit IPv6 Internet

China Internet users strive to spare businesswoman from death

BEIJING (Reuters) - Thousands of Chinese Internet users have urged China's Supreme Court to spare a 31-year-old death row convict, once one of China's richest women, in a contentious fraud case that has sparked sympathy for the self-made daughter of a peasant.

It has become a touchstone issue for China's vocal Internet campaigners and newly rich private entrepreneurs who see the sentence as too harsh as Beijing struggles to deliver social harmony as wealth inequality soars.

Wu Ying, president of Bense Holding Group in eastern Zhejiang province, was arrested in 2007 and sentenced to death two years later by the Jinhua Intermediate People's Court. She was accused of illegally raising 770 million yuan ($122 million), between 2005 and 2007, from 11 people who in turn sought money from other investors.

Wu was convicted of bilking investors of 380 million yuan, promising them exorbitant returns on money that she used to buy rapidly-appreciating real estate assets and luxury items which she says she aimed to re-sell at a profit.

The Zhejiang High Court rejected Wu's appeal last month on grounds that she "squandered" the funds and did not use them in "normal operational activities."

Wu has appealed against her sentence to the Supreme People's Court. In a rare move prior to reaching a verdict, the highest court said a review of her case will be handled "with care", conducted "based on facts" and "according to the law." A court spokesman did not say when the final verdict will be delivered.

TOUCHES ON KEY INITIATIVES

The case is particularly pointed as it touches on two key policy initiatives in Beijing -- one to curb speculation in real estate, the other to shut down the spread of unregulated lending in the shadow banking system.

A public outcry over soaring property prices and a scandal that saw private entrepreneurs in Wenzhou, in Zhejiang province, flee into hiding to escape loan sharks after being unable to secure credit from China's big state-backed banks has forced personal pledges from the country's leaders to turn things around.

Premier Wen Jiabao toured Wenzhou last autumn at the height of the scandal, promising to ensure the right policy mix in future to support access to credit and economic growth.

Meanwhile, a two year-long campaign to bring property prices back to "reasonable levels" -- as determined by the leadership -- has struggled to gain traction, only really doing so in the last quarter of 2011. Home prices have fallen marginally in key cities, but remain many times the level they were a decade ago.

Microbloggers who have rushed to the defense of Wu, whose humble beginnings saw her open a hair salon in 1997, include well-known tycoons, academics and Zhang Sizhi, the 85-year-old defense lawyer of Mao Zedong's widow Jiang Qing.

Zhang argued that Wu did not defraud investors because she did not flee or "squander" the funds and that she invested in hotels, advertising, wedding planning and transport companies with money from friends and family, not the general public.

China's 500 million Internet users enjoy limited freedoms, with microblogs becoming a magnet to highlight abuse of power and champion victims of perceived miscarriages of justice.

"To save Wu Ying is to save ourselves," real estate magnate Ren Zhiqiang wrote in his Tweeter-like microblog.

"Spare (her) from the (executioner's) blade!" property tycoon Pan Shiyi said in his microblog, using an ancient saying.

"Today, we save Wu Ying. Tomorrow, more people will save us," wrote Xiamen University literature professor Yi Zhongtian.

DOUBLE STANDARDS?

Many microbloggers accused courts of double standards and showing leniency to corrupt government officials.

The public outcry came a year after parliament abolished capital punishment for 13 types of non-violent economic crimes.

China halved the number of executions to about 4,000 last year compared with 2005, rights group Dui Hua Foundation estimates. The official figure is considered a state secret.

The high court ruled that Wu "squandered" the money on 41 cars and jewellery worth 140 million yuan. Police in Wu's hometown, Dongyang in Zhejiang province, seized and sold by auction 30 cars for just 3.9 million yuan.

Wu's father, Wu Yongzheng, insisted that she could repay her debts by selling flats bought for 160 million yuan around 2006.

The Southern Weekend newspaper estimates that her real estate assets are now worth 400 million yuan, but the Dongyang Intermediate Court put it at one-third the market price.

($1 = 6.2996 Chinese yuan)

(Editing by Ken Wills and Richard Borsuk)

Read the original:
China Internet users strive to spare businesswoman from death

DDos attacks spreading to IPv6 Internet

The next-gen Internet, still immature, is now a pathway for Net attacks, a study finds. Also, ideology has become the primary reason for DDoS attacks.

The idyllic byways of the next-generation IPv6 Internet now suffer an affliction previously limited to the mainstream IPv4 Internet: distributed denial-of-service attacks.

And worse, the still-immature IPv6 network is being caught with its pants down when it comes to repelling the DDoS attacks. That's the conclusion of Arbor Networks' latest annual study on the Internet's operational security, released today.Only 4 percent of survey respondents reported seeing IPv6 DDoS attacks--but it shows the IPv6 Internet is no longer free of them.

"This is a significant milestone in the arms race between attackers and defenders," Arbor Networks said. "We believe that the scope and prevalence of IPv6 DDoS attacks will gradually increase over time as IPv6 is more widely deployed."

For the moment, the volume is still relatively small--only 4 percent of survey respondents reported seeing IPv6 DDoS attacks--but that's a worrisome harbinger.

DDoS attacks use a swarm of computers to swamp a target machine on the Internet with traffic so it's unusable. Such attacks sometimes are launched from botnets of compromised computers for criminal reasons--but now the top cause is ideology such as that evident in Anonymous' coordinated protest attacks.

DDoS attacks send traffic to a particular Internet address, and today the vast majority of those addresses are handled by Internet Protocol version 4, or IPv4. IPv6, which vastly increases the number of possible addresses to deal with the fact that IPv4 is running out of them, is gradually becoming a reality as those with servers and network gear invest in the new network.

IPv6 isn't the main route for attacks, since it's still a relative backwater, but two problems make IPv6 particularly vulnerable. First, with the relatively immature network infrastructure, many network operators don't have the ability to scrutinize network traffic well enough to distinguish DDoS attacks from benign traffic. Second, gateways that link IPv4 and IPv6 must store lots of "state" information about the network traffic they handle, and that essentially makes them more brittle.

Arbor forecasts greater protections, though. "Twenty percent of respondents indicated that they have no plans to mitigate IPv6 DDoS attacks. We suspect that priorities within these organizations may evolve rapidly as IPv6 network traffic becomes more prevalent," Arbor said.

Investments in countermeasures are expensive--but so are DDoS attacks.

Survey respondents reported varying costs of dealing with a DDos attack: about $1,300 or $8,000 in two cases, $250,000 or $300,000 in two others, and $1 million to $1.5 million in two others. And of course there are other costs, for example when a business or government can't get work done or sell products.Survey respondents commonly reported 1 to 10 DDoS attacks per month, but some reported hundreds.

Powerful attacks the "new normal"
The study, a global survey of network operators such as Internet service providers, also finds that DDoS attacks have become more powerful, more sophisticated, and more routine. And the leading cause: ideological attacks such as launched by Anonymous after MegaUpload arrests.

"Ideology was the most common motivating factor for DDoS attacks in 2011, followed by a desire to vandalize," Arbor Networks said. The finding is "one of the single most important data points in this year's report, with major implications in terms of threat assessment, situational awareness, and continuity of operations for network operators, governmental bodies, law enforcement agencies, and end customers alike."

Although the top bandwidth of an attack decreased from 2010's 100 gigabits per second to 2011's 60 gigabits per second, it's increasingly common to see attacks that send tremendous traffic, Arbor said."During the survey period, respondents reported a significant increase in the prevalence of flood-based DDoS attacks in the 10Gbps range. This represents the 'mainstreaming' of large flood-based DDoS attacks, and indicates that network operators must be prepared to withstand and mitigate large flood attacks on a routine basis," the report said.

Growing DDoS sophistication
In earlier years, distributed denial-of-service attacks traveled by lower-level network protocols such as TCP (Transmission Control Protocol), which is used to ensure that data is successfully delivered across a network.

Now, though, attacks are moving to higher-level services such as HTTP (Hypertext Transfer Protocol), which is used to send Web pages to browsers; DNS (Domain Name Service) for translating text-based Internet addresses into their numeric equivalents; SMTP (Simple Mail Transfer Protocol) for sending e-mail; HTTPS for encrypted Web page communications; and voice over Internet Protocol (VOIP).

That's driven in part by new attack software. "HTTP GET and HTTP POST [two HTTP commands] were the most common application-layer DDoS attack vectors, more sophisticated mechanisms such as Slowloris, LOIC, Apache Killer, SIP call-control floods, SlowPost and HOIC are increasingly prevalent," Arbor found.

HTTP, used when a browser fetches a Web page from a server, is the most common application protocol for DDoS attacks, but other avenues include the standards for Net address lookups, e-mail, and voice communications.

This story was originally published on CNET News.

Stephen Shankland
Stephen Shankland writes about a wide range of technology and products, but has a particular focus on browsers and digital photography. He joined CNET News in 1998 and since then also has covered Google, Yahoo, servers, supercomputing, Linux and open-source software and science.

More:
DDos attacks spreading to IPv6 Internet

Daily Search Forum Recap: February 15, 2012

Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web.

Search Engine Roundtable Stories:

Google Webmaster Tools Tries To Simplify Search Queries Report
A couple weeks ago, we reported that Google Webmaster Tools added features. But I missed some of the design updates to the web reports... Google Public DNS Is The Largest Public DNS Service
Google announced that the public DNS service they launched in December 2009 is now the largest public DNS service out there. Google said, "We're the largest public DNS service in the world... Google Maps Street View Images Now With Dates
I am not sure how new this is, but sometime within the year, Google Maps has begun showing the date the image was taken. Not the exact date but the month and year the image was taken with the street view cars... Webmaster Google+ Hangout Today At 4pm EDT
Google's John Mueller announced in the Google Webmaster Help forums and on Google+ that Google is running new Google+ hangouts today. One we already missed, it was about an hour or two ago at 6am EDT. But the next one is later this afternoon at 4pm EDT/1pm PDT... Lego Cake
I spotted a picture of a lego cake on Pinterest, which is sourced from tablespoon.com on building a "building blocks cake." I felt most search geeks would find the picture and directions on how this

Other Great Search Forum Threads:

Visit link:
Daily Search Forum Recap: February 15, 2012

SEO Companies Can Save Time and Make More Money with Marketing Ignite's New SEO Partnership Program

Marketing Ignite has recently established its own search engine optimization (SEO) partnership program that allows other SEO companies, hosting companies, web development companies, and other companies related to the SEO world to outsource their work to the world-renowned SEO service provider. This program will help those who avail of it to save lots of time and acquire quality results a lot quicker than before, which in turn translates to better efficiency, satisfied clients, and more profit.

(PRWEB) February 16, 2012

Instead of dealing with a huge workload all by themselves, Marketing Ignite SEO Partners can depend on one of the Internet's premier service providers to help them make automatic monthly residual income while Marketing Ignite does all the work. What's more, web development companies can now bundle their services with SEO in one package by becoming a Marketing Ignite SEO Partner as well. The advantages of this exciting new program are endless, and the abovementioned perks is only the tip of the iceberg. To wit, here are some of the benefits that SEO and web development companies can acquire by becoming partners with Marketing Ignite:

    Successful and Practical: Marketing Ignite uses SEO strategies that work in real life, so it has a proven success rate when it comes to all things SEO-related. Every one of the company's existing clients gained # 1 ranking in Google's search engine results page (SERP) for targeted and competitive keywords or key phrases by using the Marketing Ignites SEO program.

    White Labeling: Marketing Ignite SEO Partners can also avail of a white labeling service that allows SEO companies to brand Marketing Ignite's streamlined SEO services under their own name while the SEO service provider itself takes care of the backend work and the rest of the details. No matter how huge the workload, partners can take all the monthly residuals while Marketing Ignite handles all the labor for them.     Dealing with Clients: Marketing Ignite can even deal with their SEO partners' clients for them, which would allow them to receive the monthly residual income until the client is through. In only a year's time worth of SEO projects, the partner can gain lots of revenue while having Marketing Ignite take care of everything for them, so it's a win-win situation for everyone concerned.     Agent Rates, Price Markup, and Residual Monthly Income: In contrast to direct clients, partners can instead get highly discounted agent rates, which assures them of lighter expenditures for high quality work in exchange of giving Marketing Ignite the privilege of working hand-in-hand with them in providing top notch SEO services for their own clients. Partners can also mark up their prices in addition to the highly discounted partner rates. Furthermore, as already mentioned, all partners will receive residual monthly income for as long as the client stays.     Non-Spam Back Links and Quick Support in American Standard English: Marketing Ignite only uses back links that are legitimate and wouldn't be considered as spam by either Google or Yahoo. Besides which, in contrast to Marketing Ignite's competitors, the company offers highly fluent professional workers and all-day, everyday customer support. Besides which, because Marketing Ignite is a seasoned 14-year veteran known for its close ties with its clients and partners, a partner can be assured to clear, concise communication and immediate results when dealing with the SEO firm.

Marketing Ignite Co., Ltd. was founded back in August 1999 and has since, provided web marketing services to small, medium, and large companies in getting their marketing and advertising message across the worldwide web and their chosen target audience. This is a premiere SEO service provider that offers high quality Internet Marketing services such as Online Media, Consultation, Hotel Internet Marketing, Video Marketing, High-Quality Link Building, Web Copywriting, Search Engine Optimization, Pay-Per-Click Services, and more. It is their foremost goal to offer top-of-the-line SEO and web development services that would last for the long term, and they're also particularly renowned when establishing successful business relationships with their customers. Click Here to find out how your company can save time and scale your SEO services further by using Marketing Ignite’s high quality, affordable and white label partnership program.

###

Johan Hedin
Marketing Ignite Company Limited
+668 9063 2858
Email Information

Original post:
SEO Companies Can Save Time and Make More Money with Marketing Ignite's New SEO Partnership Program