Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Google's Four Minute Blackout Examined
Newest First  |  Oldest First  |  Threaded View
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
8/20/2013 | 11:56:06 AM
re: Google's Four Minute Blackout Examined
If 40% of all Internet traffic goes to Google then equating Google with the Internet is not that far fetched. Rather scary!
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
8/20/2013 | 11:55:06 AM
re: Google's Four Minute Blackout Examined
Welcome to the cloud! Just imagine you build your business 100% in the cloud and lose transactions for a four minute period. That is real cash going somewhere else. The cloud can be just one option in a mix of different models.
Zman7
50%
50%
Zman7,
User Rank: Apprentice
8/20/2013 | 4:47:08 AM
re: Google's Four Minute Blackout Examined
The other majority of the world who aren't nerds didn't even notice because it was Friday afternoon and they were at happy hour having fun.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
8/19/2013 | 8:18:23 PM
re: Google's Four Minute Blackout Examined
I'd be very worried if indeed there were some single system, without any kind of backup or failover, that could be unplugged, shutting down everything. I'm sure there's more to it.
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
8/19/2013 | 7:27:17 PM
re: Google's Four Minute Blackout Examined
"Somebody in Mountain View probably unplugged something, then plugged it back in," he said.

That's an OK explanation when something happens in my home. But inside Google? Not so much.
JerryJ
50%
50%
JerryJ,
User Rank: Apprentice
8/19/2013 | 6:25:38 PM
re: Google's Four Minute Blackout Examined
I understand and empathize with the enormous personal and business impact of Sandy. And although millions were impacted, the impact was geographically constrained. This was a 40% drop in Internet traffic globally. I don't know the statistics, but I'm guessing that the traffic on the Internet from Google searches is but a small fraction of the total. If true, that means there was a very large number of people and businesses without email, office productivity services like Docs, and more. Like Charlie Babcock, I'd like to know more. A lot more.
cbabcock
50%
50%
cbabcock,
User Rank: Apprentice
8/19/2013 | 6:10:48 PM
re: Google's Four Minute Blackout Examined
I would like to know more. Granted it was a short term incident. But it affected all Google services, except search: Maps, Gmail, Docs, Drawings, Sites, Analytics.
TerryB
50%
50%
TerryB,
User Rank: Ninja
8/19/2013 | 6:06:49 PM
re: Google's Four Minute Blackout Examined
Funny how you equate "internet access" to Google being available. I didn't even know Google was down until I read this. But when users ask me if our Corp proxy server supplied internet service is down, I always try to access Google homepage to verify (just because such a lightweight, fast loading page). Based on this, I better start trying Bing also to verify if internet access is really down. :-)
gev
50%
50%
gev,
User Rank: Moderator
8/19/2013 | 5:14:01 PM
re: Google's Four Minute Blackout Examined
During Sandy our access to gas was interrupted for about a week. At the same time, we had no electicity and very limited internet access.
Let me assure you that the lack of internet access pales in comparison with the lack gas in your car, and inability to start your furnace without electricity.
Just saying to keep things in perspective.
JerryJ
50%
50%
JerryJ,
User Rank: Apprentice
8/19/2013 | 5:01:48 PM
re: Google's Four Minute Blackout Examined
The response to this outage seemed to be all about the impact to Google's reputation and finances. Is nobody else concerned that we have become so dependent on a single provider? Setting any discussion of monopolies aside, the real concern here should be, what impact a much longer term Google outage, say a few days or weeks, have on the global economy. "That's huge"' might be an understatement.


Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...