Feeds

DDoS attack, sex warrant won't stop Assange's leaky discharge

Latest Wikileaks: Pope caught short during forest ramble

Seven Steps to Software Security

The main Wikileaks site hosting US diplomatic cables has been downed, again, by an apparent denial of service attack.

Various Wikileak mirror sites are available and the "revelations" continue to dominate the news.

According to Wikileaks's Twitter feed the attack peaked at over 10 gigabits a second - about three times greater than the previous attack.

Arbor Networks said the attacks seem to have originated from a small number of IP addresses in Russia, eastern Europe and Thailand.

Interpol yesterday issued an arrest notice for Wikileaks founder Julian Assange for alleged sex crimes committed in Sweden - accusations he has denied. Assange is currently believed to be in London.

Today's stories include claims that Bank of England governor Mervyn King believed, along with the rest of the nation, that George Osborne and David Cameron lacked experience and political depth. He apparently told the US ambassador to London that the pair "had a tendency to think about issues only in terms of politics, and how they might affect Tory electorability" – a shocking revelation indeed.

The site is releasing the cables in dribs and drabs in the hope of staying in the news for as long as possible.

Sarah Palin meanwhile called for Assange to be "hunted down like bin Laden" - we're assuming she doesn't mean hunted unsuccessfully at the expense of tens of thousands of lives and billions of dollars, but what does she mean? Answers below please. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.