Akamai, the largest of the large scale content delivery services was not delivering content earlier today. According to a post from Akamai:
"An isolated issue occurred this morning (roughly during the period of 8:00 a.m. ? 9:30 a.m. ET), where multiple Akamai customers experienced intermittent performance and availability degradation.
This degradation was the result of a bug within one of Akamai's backend content control management tools, which allows the expiration of content on the Akamai network. The degradation was not a result of any outside interference with Akamai's network (such as Denial of Service or hacking).
Upon identification of the bug, Akamai quickly took corrective action which returned customers to normal service levels. Akamai is currently putting measures in place to return the content management tool to its normal working order and is adding safeguards such that the issue will not occur in the future. In the meantime, Akamai customers are able to serve their content through the Akamai Network normally."
So, although it sounds like the rollout of a new version of an internal tool caused them to essentially DoS themselves, things seem to be all better now.
New Angle(r) On An Old Phish
First of all, my apologies for the headline... I couldn't help myself.
It seems that the phisher folk have found some new bait. The newest angle(r) involves sending out fake "order confirmation" messages bearing links that lead to web pages containing exploits for some older IE vulnerabilities. The idea is that no one will be able to resist simply looking at where the link points, and that the phisher will then snag a few unpatched folk in the process. Let's keep those browsers patched, people. And be careful out there...
Other than that, it's been quiet.
Handler on Duty: Tom Liston ( http://www.labreatechnologies.com )
Sep 13th 2005
|Thread locked Subscribe||
Sep 13th 2005
1 decade ago