Need to Know: Denial of Service
Twitter and Facebook were hit by a denial of service attack yesterday - but what exactly does this mean?


Firewalls will prevent basic attacks, but not more complex ones. Special packet filters can also be used to drop out the attacking traffic, while switches and routers can be manipulated to help limit the effectiveness of a DoS hit depending on the style of attack.
Automated traffic analysis systems and other security software can also be used. Because there are so many types of DoS attacks, there's no easy fix, however.
In fact, the best method to stop DoS attacks is to shut down botnets, which are made up of people's computers which have been compromised.
Attackers use those computers to access sites or to send spam to drive traffic, so if we all prevent our computers from going zombie by keeping our PCs safe from trojans and other malware, there will be fewer botnets out there to use.
As Cluley said: "Scan your PC with an up-to-date anti-virus, make sure you have the latest security patches and run a decent firewall. That way you'll be a good internet citizen and ensuring you're not contributing to the problem."
How common are they?
A DoS attack is a pretty common way of attacking a site. They are frequently used for political reasons it's a pretty scary way to make a point, but it's often unclear what the point is.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Indeed, the Twitter attacks are currently being attributed to a Russian spat with a Georgian blogger.
Earlier this year, DoS attacks took down American and South Korean government sites. Reports suggested some of the attacks originated in the UK, too.
Even the BBC has been a target, after getting hit by a five-hour long attack last year.
One classic DoS attack came with the MyDoom worm, which was programmed to infect computers to be used in an attack against SCO. The firm offered a $250,000 bounty for the capture of the attacker.
Want to read more background on the latest IT topics? Click here for all the tech cheatsheets in our Need to Know series.
Freelance journalist Nicole Kobie first started writing for ITPro in 2007, with bylines in New Scientist, Wired, PC Pro and many more.
Nicole the author of a book about the history of technology, The Long History of the Future.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Who owns the data used to train AI?
Analysis Elon Musk says he owns it – but Twitter’s terms and conditions suggest otherwise
By James O'Malley
-
Elon Musk confirms Twitter CEO resignation, allegations of investor influence raised
News Questions have surfaced over whether Musk hid the true reason why he was being ousted as Twitter CEO behind a poll in which the majority of users voted for his resignation
By Ross Kelly
-
Businesses to receive unique Twitter verification badge in platform overhaul
News There will be new verification systems for businesses, governments, and individuals - each receiving differently coloured checkmarks
By Connor Jones
-
Ex-Twitter tech lead says platform's infrastructure can sustain engineering layoffs
News Barring major changes the platform contains the automated systems to keep it afloat, but cuts could weaken failsafes further
By Rory Bathgate
-
‘Hardcore’ Musk decimates Twitter staff benefits, mandates weekly code reviews
News The new plans from the CEO have been revealed through a series of leaked internal memos
By Connor Jones
-
Twitter could charge $20 a month for 'blue tick' verification, following Musk takeover
News Developers have allegedly been given just seven days to implement the changes or face being fired
By Rory Bathgate
-
Twitter reports largest ever period for data requests in new transparency report
News The company pointed to the success of its moderation systems despite increasing reports, as governments increasingly targeted verified journalists and news sources
By Rory Bathgate
-
IT Pro News In Review: Cyber attack at Ikea, Meta ordered to sell Giphy, new Twitter CEO
Video Catch up on the biggest headlines of the week in just two minutes
By IT Pro