British Universities Suffer Sustained Cyber Assault

University students across the UK have been unable to submit work, after the academic computer network known as Janet came under cyber-attack.

Distributed denial of service (DDoS) attacks began on Monday and are continuing, according to the network's operator, Jisc. The attacks "have resulted in reduced connectivity and disruption", says a statement on Jisc's facebook page. Engineers are working to restore normal service, it adds.

'Malicious attack'
DDoS attacks are malicious attempts to interrupt or degrade an internet-connected service, often by flooding that service with large amounts of network traffic.

Jisc, formerly the Joint Information Systems Committee, is a publicly funded body that provides computer network services to higher education and research bodies.

Its statement says it is using "various blocks and filtering" to limit the impact of the disruption, "but the details of each attack are subject to change".

The body says it has had to limit its tweets "as we suspect that those behind today's DDoS attack are adjusting their point of attack based on our Twitter updates". It also had to close its own website for a period, as it also came under attack.

"We understand the importance of connectivity to colleges, universities and other public sector organisations," said Jisc executive director Tim Kidd. "We are doing everything in our power to ensure normal service in resumed as soon as possible, and in the meantime to minimise any disruption that users of the Janet network may be experiencing. We apologise for any inconvenience caused."

University of Manchester, one of the universities affected by the attack, said staff and students had experienced intermittent problems accessing external sites. Emails to staff and students warned them to expect "slow performance or a complete lack of access to external services…By flooding the service with excessive network traffic, an attacker is attempting to exceed the capacity of the service, which causes the service to run slowly or become unavailable," the university said.

It added staff and students were experiencing problems with accessing external websites, email, submitting assessments online and external collaboration services for research staff.
BBC: http://bbc.in/1OSPVxF

« ISIS Counter-Attack Anonymous
Kazakhstan: A Poorly Thought-out Surveillance Technique or an Experiment For the West? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.