Feeds

Twitter goes titsup

Mystery hackers knock-over micro-blogging service

Build a business case: developing custom apps

Updated Twitter was knocked offline on Thursday after the site became the victim of a distributed denial of service attack.

Users of the micro-blogging service are used to seeing the fail whale, a graphic that appears when service is over capacity, but this time around the site was left completely unreachable from around 1500 on Thursday (UK time) for around 90 minutes.

A terse messages on Twitter's status blog initially said the site was down before adding "We are defending against a denial-of-service attack, and will update status again shortly".

Unknown hackers take out Twitter

While there's no indication who might be behind the attack, Twitter has a few declared enemies. It has earned the ire of malware makers after turning on filtering technology to stop them exploiting its users.

More ominously it was cited as a key element in recent anti-government unrest in both Iran and China.

Graham Cluley, a security consultant at Sophos, initially said the hallmarks of the outage were not those of a planned downtime.

"Something has clearly gone wrong," he said. "It could be human error or some other cause. We have nothing to indicate that the outage is caused by a security problem at this point."

The outage has at least one positive effect. "All those Twitter addicts will be doing something more useful instead," Cluley quipped. ®

Update

Twitter returned towards the land of the living at around 1645 (UK time). The website remains difficult to reach while the attack is continuing, however some messages are getting through. The motives (much less the perpetrators) behind the assault remain unclear.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?