Categories
Tech

Cyber attacks happening in real-time

Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.

Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. Usually all you know about them is after the event has happened, and real-time tracking so far has been quite difficult.

Norse Corporation, a company that delivers Real-Time Visibility into Cyber Attacks in Progress All Over the World, has assembled a visual tool to help better demonstrate a tiny fraction of what cyberattacks look like.

Since it’s impossible to watch as every cyberattack happens in the world, Norse has deployed and impressive network of honeypots to help monitor attackers that are effectively casting a wide net to see what gets caught. On the Norse map, you can see the different attack types being used as these attempts happen, as well as what country the attack originated from and a visual history of attacks on a single honeypot if you mouse over any one target.

The attacks represent a random string of events and a tiny fraction of what actually is happening 24/7 around the globe. Its a reminder that services and devices must stay up to date and that cases when you see Sony being hacked or North Korea’s internet going down, cyber-wars are one of the closest explanations to the activity.