Two Major ISPs Are Suffering Outages, Making the Internet Really Slow Right Now

Freshly Exhumed writes: Two major backbone internet service providers — Level 3 and Cogent — appear to be suffering from massive outages and downgraded service, according to ISP monitoring service Downdetector. Users in San Francisco, Los Angeles, Chicago, Boston, Dallas, Atlanta, New York, Philadelphia, Baltimore, and Washington, D.C. are apparently being hit the hardest. Comcast is also said to be affected to a lesser degree. “Backbone internet service providers work directly with large internet platforms like Netflix to deliver large amounts of data across networks, and also work behind the scenes of consumer-facing ISPs, ” reports Slate. “Since the internet is an interconnected mess of wires, disruptions with Level 3 and Cogent could impact service for Comcast and Verizon users in turn.” Read more of this story at Slashdot.

Follow this link:
Two Major ISPs Are Suffering Outages, Making the Internet Really Slow Right Now

Comcast’s nationwide outage was caused by a configuration error

Yesterday, folks across the country reported that Comcast internet was down — an unusually large outage that lasted around 90 minutes. It turns out that the problem was caused by Level 3, an enterprise ISP that provides the backbone for other internet providers like Verizon, Comcast and RCN. “Our network experienced a service disruption affecting some of our customers, ” the firm said in a statement. “The disruption was caused by a configuration error.” The outage shows yet again just how vulnerable the internet is in the US. Last year around this time, a DDoS attack shut down Spotify, Twitter, the New York Times and other sites, prompting some soul-searching from ISPs and internet security experts. This time it was a case of simple human error, but the results were similar: The internet, which many individuals and businesses now depend on for their livelihoods, went down. Level 3 internet backbone currently has disruptions affecting U.S. RCN immediately rerouted to alternate backbone. RCN service normal. — RCN (@RCNconnects) November 6, 2017 The problem, according to an expert contact by Wired , was a “route leak.” ISPs use something called the Border Gateway Protocol to find networks they can route data packets through. To figure out which routes are the most efficient, so-called Autonomous Systems (ASes) track data packets that are moving through various networks. A route leak is caused when these ASes relay bad information about their IP addresses. That can cause internet providers to make bad or inefficient routing decisions, causing packets to be delayed or stopped altogether. A good example of this is an error Level 3 made back in 2015 . In that case, a telecom in Malaysia accidentally told Level 3 that it could relay internet data from anywhere around the world. Level 3 accepted the routes, even thought it shouldn’t have, causing worldwide data to be shunted through the Malaysian telecom, which had no way of handling all the traffic. Something similar could have happened yesterday if Level 3 was, say, tweaking its routing settings and made a mistake. ISPs use filters to guard against such errors, but the scale of the internet makes it difficult to catch them all. After last year’s large DDoS attack, security experts pointed out that internet infrastructure providers like Dyn and Level 3 are particularly vulnerable to attacks. Yesterday’s outage shows how vulnerable they are to human error, too. Via: Wired Source: Comcast

View the original here:
Comcast’s nationwide outage was caused by a configuration error

Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI

An anonymous reader writes: “VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, ” writes Bleeping Computer, “but a recent criminal case shows that at least some do store user activity logs.” According to the FBI, VPN providers played a key role in identifying an aggressive cyberstalker by providing detailed logs to authorities, even if they claimed in their privacy policies that they don’t. The suspect is a 24-year-old man that hacked his roommate, published her private journal, made sexually explicit collages, sent threats to schools in the victim’s name, and registered accounts on adult portals, sending men to the victim’s house… FBI agents also obtained Google records on their suspect, according to a 29-page affidavit which, ironically, includes the text of one of his tweets warning people that VPN providers do in fact keep activity logs. “If they can limit your connections or track bandwidth usage, they keep logs.” Read more of this story at Slashdot.

Continued here:
Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI

Google Pays Apple $3 Billion Per Year To Remain On the iPhone, Analyst Says

In a note to investors on Monday, Bernstein analyst A.M. Sacconaghi Jr. said Google is paying Apple billions of dollars per year to remain the default search engine on iPhones and iPads. “The firm believes that Google will pay Apple about $3 billion this year, up from $1 billion just three years ago, and that Google’s licensing fees make up a large bulk of Apple’s services business, ” reports CNBC. From the report: “Court documents indicate that Google paid Apple $1 billion in 2014, and we estimate that total Google payments to Apple in FY 17 may approach $3 billion, ” Bernstein analyst A.M. Sacconaghi Jr. said. “Given that Google payments are nearly all profit for Apple, Google alone may account for 5% of Apple’s total operating profits this year, and may account for 25% of total company OP growth over the last two years.” Read more of this story at Slashdot.

View post:
Google Pays Apple $3 Billion Per Year To Remain On the iPhone, Analyst Says

Malicious Apps Brought Ad-Clicking ‘Judy’ Malware To Millions Of Android Phones

An anonymous reader quotes Fortune: The security firm Checkpoint on Thursday uncovered dozens of Android applications that infected users’ devices with malicious ad-click software. In at least one case, an app bearing the malware was available through the Google Play app store for more than a year. While the actual extent of the malicious code’s spread is unknown, Checkpoint says it may have reached as many as 36.5 million users, making it potentially the most widely-spread malware yet found on Google Play… The nefarious nature of the programs went unnoticed in large part, according to Checkpoint, because its malware payload was downloaded from a non-Google server after the programs were installed. The code would then use the infected phone to click on Google ads, generating fraudulent revenue for the attacker. Read more of this story at Slashdot.

See original article:
Malicious Apps Brought Ad-Clicking ‘Judy’ Malware To Millions Of Android Phones

FCC stonewalls demands for evidence of cyberattack

The FCC swears that a denial of service attack hit its servers hours after Last Week Tonight ‘s John Oliver rallied support for net neutrality, but where’s the evidence? Well, don’t expect it any time soon. In an interview with ZDNet , the regulator’s David Bray says the FCC won’t release the logs that might show who was responsible for the incident. The logs contain private info like IP addresses, he says. Bray does note that there wasn’t a botnet involved, though — instead, the traffic came from commercial cloud services using the FCC’s public programming interface. But if it wasn’t a botnet, then who was involved? Some critics are concerned that the FCC isn’t exactly being forthright. The advocacy group Fight for the Future tells ZDNet that the FCC should disclose information “to the appropriate authorities and to journalists” to have them investigate the data while maintaining privacy. And if there’s an organization behind the attack, the group says, the FCC should divulge who it is. That it isn’t is worrying — does the Commission not know, or is it trying to hide the origins? Fight for the Future is concerned that the traffic is either from net neutrality supporters (and thus evidence that the FCC couldn’t/wouldn’t handle opposition to its net neutrality rollback ) or opponents trying to stifle criticism. And unfortunately, there’s circumstantial evidence that might support either theory. Anti-net neutrality bots recently flooded the FCC’s comments, and Chairman Ajit Pai even suggested that he might honor these obviously fake statements. It doesn’t help that the FCC has since gone into a “sunshine period” where it won’t take new public comments on decisions. And it’s no secret that telecoms are less than fond of net neutrality proponents, especially when they try to expose astroturfing campaigns . Simply put, both the current FCC and internet providers have a vested interest in downplaying net neutrality’s supporters while enshrining its critics. The FCC says it has since upgraded its website to better handle loads, so it isn’t completely unresponsive. Without more disclosures about what happened around the attack, though, it’s impossible to know just how honest it really is — and it’s not helping its case by being unresponsive to public outcries. Via: Gizmodo Source: ZDNet (1) , (2)

Link:
FCC stonewalls demands for evidence of cyberattack

Renault And Nissan Plants Hit By Massive Ransomware Attack

French auto giant Renault became the first major French company to report being affected by Friday’s ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News . An English plant of Renault’s alliance partner Nissan was also hit by the attack. Read more…

Original post:
Renault And Nissan Plants Hit By Massive Ransomware Attack

Renault And Nissan Plants Hit By Massive Ransomware Attack

French auto giant Renault became the first major French company to report being affected by Friday’s ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News . An English plant of Renault’s alliance partner Nissan was also hit by the attack. Read more…

Link:
Renault And Nissan Plants Hit By Massive Ransomware Attack

Renault And Nissan Plants Hit By Massive Ransomware Attack

French auto giant Renault became the first major French company to report being affected by Friday’s ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News . An English plant of Renault’s alliance partner Nissan was also hit by the attack. Read more…

Read more here:
Renault And Nissan Plants Hit By Massive Ransomware Attack

Renault And Nissan Plants Hit By Massive Ransomware Attack

French auto giant Renault became the first major French company to report being affected by Friday’s ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News . An English plant of Renault’s alliance partner Nissan was also hit by the attack. Read more…

View original post here:
Renault And Nissan Plants Hit By Massive Ransomware Attack