How does one steal crypto-coins? By hacking DNS and BGP – the two cornerstone protocols governing the Internet. With any cryptographic system, one way to compromise it is to be a man in the middle (MITM) when a transaction is taking place. Both ends of the transaction believe they’re talking…
Internet Exchanges (IX) play an important “efficiency” role in the practical matter of physically connecting the networks that comprise the Internet. IXs are facilities that provide space, power and connectivity to member networks—typically Internet Service Providers (ISPs), telecom, cable and mobile carriers, content providers, web enterprises and sophisticated enterprises such…
On Friday, March 2nd, 2018, a power outage hit the AWS-East Region (Ashburn), affecting hundreds of critical enterprise services like Atlassian, Slack and Twilio. Significant corporate websites and Amazon’s own service offerings were impacted as well. ThousandEyes operates a global set of software agents performing Internet-aware network monitoring. We were…
On Wednesday, February 28th, 2018 at 9:15am Pacific Standard Time, GitHub, the popular web-based hosting service for software development, was a victim of a powerful DDoS attack that impacted its global user base of 20M. It was one of the largest DDoS attacks, with attack traffic peaking at 1.3Tbps. Concerned…
How can network monitoring help understand online trading website performance? In the first days of February, 2018 the stock market went on a bit of wild ride, with high levels of volatility amidst heavy trading sessions. On February 5th, the Dow skidded almost 1600 points before recovering slightly to a…