Denial-of-service attack
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.A DoS attack generally cons...
Denial-of-service attack - Wikipedia
This Hacker's Tiny Device Unlocks Cars And Opens Garages
The $32 radio device, smaller than a cell phone, is designed to defeat the "rolling codes" security used in not only most modern cars and trucks' keyless entry systems, but also in their alarm systems...
OP hit by another denial of service attack
Some users may encounter issues using the online services of the financial services group.
Digital Attack Map
A live data visualization of DoS attacks around the globe
Smurf attack
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a co...
Ping flood
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most effective by using the flood option of ping which sends I...
Ping of death
A ping of death is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A correctly formed ping message is typically 56 bytes in size, or 84 byte...
Backscatter (email)
Backscatter (also known as outscatter, misdirected bounces, blowback or collateral spam) is incorrect automated bounce messages sent by mail servers, typically as a side effect of incoming spam.Recipi...
Censorship in the People's Republic of China
Censorship in the People's Republic of China (PRC) is implemented or mandated by the PRC's ruling party, the Communist Party of China (CPC). Notable censored subjects include but are not limited to, d...
This Hacker's Tiny Device Unlocks Cars And Opens Garages
The $32 radio device, smaller than a cell phone, is designed to defeat the "rolling codes" security used in not only most modern cars and trucks' keyless entry systems, but also in their alarm systems...
DoSnet
A DoSnet (Denial of Service network) is a type of botnet/malware and mostly used as a term for malicious botnets while benevolent botnets often simply are referred to as botnets. Dosnets are used for ...
Martian packet
A Martian packet is an IP packet which specifies a source or destination address that is reserved for special-use by Internet Assigned Numbers Authority (IANA). If seen on the public internet, these ...
Zombie (computer science)
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or a...
Zombie (computer science) - Wikipedia
Intervasion of the UK
The Intervasion of the UK was a 1994 electronic civil disobedience and collective action against John Major's Criminal Justice Bill which sought to outlaw outdoor dance festivals and "music with a rep...
Slowloris
Slow lorises are a group of several species of nocturnal strepsirrhine primates which make up the genus Nycticebus. Found in Southeast Asia and bordering areas, they range from Bangladesh and Northeas...
Robust random early detection
Robust random early detection (RRED) is a queueing disclipine for a network scheduler. The existing random early detection (RED) algorithm and its variants are found vulnerable to emerging attacks, es...
UDP Unicorn
UDP Unicorn is a free and open source DoS attack software. The software attacks a computer's network connection by repeatedly sending UDP packets with garbage data.UDP Unicorn uses Winsock to create s...
INVITE of Death
An INVITE of Death is a type of attack on a VoIP-system that involves sending a malformed or otherwise malicious SIP INVITE request to a telephony server, resulting in a crash of that server. Because ...
Operation Payback
Operation Payback was a coordinated, decentralized group of attacks on high profile opponents of Internet piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retal...
Operation Payback - Wikipedia
ZMW attack
The ZMW attack is a hypothetical denial-of-service attack on the Internet's routing infrastructure, named after Ying Zhang, Z. Morley Mao, and Jia Wang, the researchers who published the original pape...
NBName
NBName is a computer program that can be used to carry out denial-of-service attacks that can disable NetBIOS services on Windows machines. It was written by Sir Dystic of CULT OF THE DEAD COW (cDc) ...
Slashdot effect
The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic. This overloads the smaller site, causing it to slow down ...
Billion laughs
In computer security, a billion laughs attack is a type of denial-of-service (DoS) attack which is aimed at parsers of XML documents.It is also referred to as an XML bomb or as an exponential entity e...
UDP flood attack
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol. Using UDP for denial-of-service attacks is not...
SYN flood
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unres...
SYN flood - Wikipedia
Ivan Maksakov
Ivan Maksakov (born February 25, 1983) was one of the three men behind the start of DDoS attacks for hire and extortion. Ivan was most famously known as "eXe", but he also used the nicknames: NASA, b...
Twinge attack
An Internet-based computer-networking term. A Twinge attack is a flood of false ICMP packets in an attempt to cripple a system.The attack is spoofed, that is random fake Internet source addresses are ...
DDoS attacks during the October 2011 South Korean by-election
The DDoS attacks during the October 2011 South Korean by-election were two separate denial-of-service attacks (DDoS) during the October 2011 by-election. The attacks for which the secretary of the Gra...
Operation AntiSec
Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of hacking group LulzSec, the group Anonymous, and others inspired by th...
Operation AntiSec - Wikipedia