British Universities Suffer Sustained Cyber Assault

University students across the UK have been unable to submit work, after the academic computer network known as Janet came under cyber-attack.

Distributed denial of service (DDoS) attacks began on Monday and are continuing, according to the network's operator, Jisc. The attacks "have resulted in reduced connectivity and disruption", says a statement on Jisc's facebook page. Engineers are working to restore normal service, it adds.

'Malicious attack'
DDoS attacks are malicious attempts to interrupt or degrade an internet-connected service, often by flooding that service with large amounts of network traffic.

Jisc, formerly the Joint Information Systems Committee, is a publicly funded body that provides computer network services to higher education and research bodies.

Its statement says it is using "various blocks and filtering" to limit the impact of the disruption, "but the details of each attack are subject to change".

The body says it has had to limit its tweets "as we suspect that those behind today's DDoS attack are adjusting their point of attack based on our Twitter updates". It also had to close its own website for a period, as it also came under attack.

"We understand the importance of connectivity to colleges, universities and other public sector organisations," said Jisc executive director Tim Kidd. "We are doing everything in our power to ensure normal service in resumed as soon as possible, and in the meantime to minimise any disruption that users of the Janet network may be experiencing. We apologise for any inconvenience caused."

University of Manchester, one of the universities affected by the attack, said staff and students had experienced intermittent problems accessing external sites. Emails to staff and students warned them to expect "slow performance or a complete lack of access to external services…By flooding the service with excessive network traffic, an attacker is attempting to exceed the capacity of the service, which causes the service to run slowly or become unavailable," the university said.

It added staff and students were experiencing problems with accessing external websites, email, submitting assessments online and external collaboration services for research staff.
BBC: http://bbc.in/1OSPVxF

« ISIS Counter-Attack Anonymous
Kazakhstan: A Poorly Thought-out Surveillance Technique or an Experiment For the West? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.