Akamai Problems, New Angle(r) On An Old Phish
Akamai Problems
Akamai, the largest of the large scale content delivery services was not delivering content earlier today. According to a post from Akamai:
"An isolated issue occurred this morning (roughly during the period of 8:00 a.m. ? 9:30 a.m. ET), where multiple Akamai customers experienced intermittent performance and availability degradation.
This degradation was the result of a bug within one of Akamai's backend content control management tools, which allows the expiration of content on the Akamai network. The degradation was not a result of any outside interference with Akamai's network (such as Denial of Service or hacking).
Upon identification of the bug, Akamai quickly took corrective action which returned customers to normal service levels. Akamai is currently putting measures in place to return the content management tool to its normal working order and is adding safeguards such that the issue will not occur in the future. In the meantime, Akamai customers are able to serve their content through the Akamai Network normally."
So, although it sounds like the rollout of a new version of an internal tool caused them to essentially DoS themselves, things seem to be all better now.
New Angle(r) On An Old Phish
First of all, my apologies for the headline... I couldn't help myself.
It seems that the phisher folk have found some new bait. The newest angle(r) involves sending out fake "order confirmation" messages bearing links that lead to web pages containing exploits for some older IE vulnerabilities. The idea is that no one will be able to resist simply looking at where the link points, and that the phisher will then snag a few unpatched folk in the process. Let's keep those browsers patched, people. And be careful out there...
Other than that, it's been quiet.
Too quiet...
-----------------------------------------------------------
Handler on Duty: Tom Liston ( http://www.labreatechnologies.com )
Akamai, the largest of the large scale content delivery services was not delivering content earlier today. According to a post from Akamai:
"An isolated issue occurred this morning (roughly during the period of 8:00 a.m. ? 9:30 a.m. ET), where multiple Akamai customers experienced intermittent performance and availability degradation.
This degradation was the result of a bug within one of Akamai's backend content control management tools, which allows the expiration of content on the Akamai network. The degradation was not a result of any outside interference with Akamai's network (such as Denial of Service or hacking).
Upon identification of the bug, Akamai quickly took corrective action which returned customers to normal service levels. Akamai is currently putting measures in place to return the content management tool to its normal working order and is adding safeguards such that the issue will not occur in the future. In the meantime, Akamai customers are able to serve their content through the Akamai Network normally."
So, although it sounds like the rollout of a new version of an internal tool caused them to essentially DoS themselves, things seem to be all better now.
New Angle(r) On An Old Phish
First of all, my apologies for the headline... I couldn't help myself.
It seems that the phisher folk have found some new bait. The newest angle(r) involves sending out fake "order confirmation" messages bearing links that lead to web pages containing exploits for some older IE vulnerabilities. The idea is that no one will be able to resist simply looking at where the link points, and that the phisher will then snag a few unpatched folk in the process. Let's keep those browsers patched, people. And be careful out there...
Other than that, it's been quiet.
Too quiet...
-----------------------------------------------------------
Handler on Duty: Tom Liston ( http://www.labreatechnologies.com )
Keywords:
0 comment(s)
×
Diary Archives
Comments