“Imagine that an army of lemmings just jumped the queue at McDonald's in front of you – and each is ordering a whopper," Telegram tweeted. "The server is busy telling the whopper lemmings they came to the wrong place – but there are so many of them that the server can't even see you to try and take your order.” When messaging app Telegram was DDoSed, it tweeted a fitting analogy for a DDoS attack. Your phone, computer or smart TV could be part of an attack and you’d be none the wiser. So a single hacker can then turn this army of devices on a chosen target and use them to overwhelm it, often without the knowledge of the people who actually own those devices. The hacker does this with a botnet, which is a network of devices or ‘zombie computers’ that the hacker has infected with malicious software that allows them to be remotely controlled. The aim of a DDoS attack is to overwhelm a site with too much traffic or to overload your system with too many requests until something eventually crashes. When you hear that a website has been taken down by hackers, the chances are that a DDoS attack has been used to do it. A Distributed Denial-of-Service (DDoS) attack is what happens when a hacker uses an army of malware-infected devices to launch a co-ordinated attack on a website, server, or network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |