Saturday, March 9, 2013

Website that updates you on Cyber-attacks as these 'happen'


Cyber attacks have become an ordinary thing on internet and each day  countless attacks are made to steal away your privacy, data and much more.

Screen shot of the cyber attacks taking place at the time of writing this post

Now we have a chance to observe these cyber attacks, thanks to Deutsche Telekom, a German telecommunications company, which has developed a website that allows users to monitor cyber attacks as they happen.

Sicherheitstacho.eu (loosely translated as "security tachometer") displays events as they happen, giving the time of the attack, country of origin and the intended target. While watching the site can be quite hypnotic, its relevance for the everyday user is limited (unless your website or network is currently under attack, in which case, the site still probably won't help much).


For Deutsche Telekom, however, the information will be invaluable. Sicherheitstacho allows the company to compile data for thousands of incidents daily, which will grant insight into common targets and attacker demographics.

However, for individuals and individual site, it may be of little help as it gives an overall and generalized view of the cyber attacks taking place in a region, continent or best in a country.



Going by the real time anaylsis, one can though find which country ranks higher than the other. For instance the most active country is Russia, with an impressive 2.4 million cyberattacks launched in February 2012. Taiwan comes in a distant second with 900,000, followed by the website's native Germany at 780,000 and the Ukraine with 566,000. The United States takes sixth place, with more than 355,000 attacks launched from its soil.

Attacks on the server message block (SMB) protocols of websites are the most common method of harassment, clocking in at more than 27 million attempts in the last month. SMB is a networking function that allows file sharing among machines, making it a logical starting point for information thieves.

Attacks on other network necessities, such as operating systems and communication ports, were much less common, but still fell prey to hundreds of thousands of attacks.

Read more about it at: Mashable

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More