Net Attack DismissedInternet security experts seem untroubled by Monday’s assault on the Internet’s 13 root servers, according to a story in today’s Boston Globe. Some root servers were still performing slower than normal yesterday, but the system had largely returned to normal. While they’re concerned about the sheer ambition of the attack, one that could have disrupted the entire global Internet if it had worked, the experts say this attack was crude and easily beaten back. “Local [server] operators secure their own machines, and they all do it in different ways,” the Globe quotes John Crain, technical manager for ICANN. Far from making the system less secure, Crain says that this freewheeling approach is much safer. A security flaw in the server in Tokyo might not exist in the one at the University of Maryland, because the two don’t use the same software. But security experts aren’t complacent. They say that while a single attack probably couldn’t take down the whole Internet, the system is riddled with flaws that could enable massive disruptions.More Than One Net Attack on MondayWashington Post, Monday’s attack on the 13 computer servers that manage the world’s Internet traffic was the first of two assaults. The second attack came six hours later, say sources familiar with the incident, and targeted “name” servers that house Internet domains such as dot-com, dot-biz and dot-info, and country code domains such as Great Britain’s dot-uk and Canada’s dot-ca. The White House’s Office of Homeland Security and the FBI are investigating Monday’s cyberattacks, but have declined to speculate on who might have been responsible. It is also not clear whether the same source was to blame for the separate attacks on root and name servers.According to an article in today’s A Palm for the ProsecutionThe New York Times today. Criminals, too, from drug dealers to spies to white collar criminals, are using them to coordinate their activities. Organizers are rarely encrypted or password-protectedeven when criminals take similar precautions in other electronic formats. As hand-held organizers like the Clié and Palm have soared in popularity, it’s not just law-abiding citizens who appreciate their usefulness in managing appointments, contacts and schedules, writes Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe