BGP spoofing
2014-12-24 17:06:45.514044+01 by Dan Lyke 0 comments
Next time you're thinking about man-in-the-middle attacks and secure Internet use, ponder this: People are using BGP spoofing to redirect Internet traffic in order to steal bitcoins.
2014-12-24 17:06:45.514044+01 by Dan Lyke 0 comments
Next time you're thinking about man-in-the-middle attacks and secure Internet use, ponder this: People are using BGP spoofing to redirect Internet traffic in order to steal bitcoins.
[ related topics: Net Culture ]
comments in ascending chronological order (reverse):
We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.