May 23rd, 2021

Sunday, May 23rd, 2021

Melbourne – Adelaide train services disrupted into next week following fatal crash

Friday, May 26, 2006

Rail services between Melbourne and Adelaide in Australia are expected to be disrupted until early next week following a fatal crash between a truck and freight train in Lismore, Victoria 170 Km (105 miles) South-West of Melbourne.

The B-Double truck hit the side of a 1,375 metre long freight train at a level crossing at 7:13 a.m. AEST on Thursday in heavy fog, derailing two locomotives and 44 goods wagons. Victorian police said that the truck had been wedged beneath the wreckage of the train.

The driver of the truck, thought to be a 34-year-old man from Wedderburn in Victoria’s North-West died in the crash. The train driver and an observer escaped uninjured. Police said it could take a number of days to retrieve the truck driver’s body. “It could possibly take days to retrieve the body” a Victorian police spokesperson said.

Great Southern Railways, which operates “The Overland” passenger train service between Melbourne and Adelaide said it expected rail services to be disrupted up until early next week. The company will transfer passengers to bus services or allow them to claim a full refund.

The crash will also disrupt freight services between Melbourne and Adelaide.

Local residents and the Victorian opposition are blaming the crash on the level crossing itself, which has no booms, lights or bells.

Rob Dennis, a local resident said the level crossing is the cause of the crash, as it is not fitted with boom gates or flashing lights.

“And it’s a blind turn for anything in a large vehicle,” he said.

Terry Mulder, the opposition’s transport spokesperson said the Bracks Government should have spent part of the $750 million allocated to fast rail projects to upgrading level crossings in Victoria.

“The State Labor Government has wasted $750 million on fast rail projects,” Mr Mulder said.

Mr Mulder said that Victoria has 2,274 level crossings, 1,468 which have no warning systems in place.

Retrieved from “https://en.wikinews.org/w/index.php?title=Melbourne_-_Adelaide_train_services_disrupted_into_next_week_following_fatal_crash&oldid=4513477”
Sunday, May 23rd, 2021

Distributed malware attacks Dyn DNS, takes down websites in US

Monday, October 24, 2016

On Friday, a network of diverse Internet-connected devices targeted the Dyn domain registration service provider. It took down Dyn clients, including several popular websites such as Twitter, Netflix, Spotify, Reddit, New York Times, and Wired.

The attack involved targeting Dyn’s domain name system servers with a large volume of requests, rendering it incapable of serving replies to legitimate requests — a DDoS (distributed denial of service) attack. Users’ browsers and other clients sent requests to Dyn to resolve the respective web sites’ domain names to an IP, but did not get a reply within the time required.

The first attack started at about 7am local time (UTC-4) and was resolved in two hours. A second attack started at mid-day, and a third attack started at about 4pm local time. Tens of millions of malicious request sources were observed, interfering with legitimate Dyn traffic.

The reports noted the malicious devices included internet-connected devices — not only servers and desktops, but also webcams, digital video recorders, routers — referred to as the Internet of Things.

On Friday evening Dyn said a security company Flashpoint and a cloud services provider Akamai identified symptoms of malware Mirai participating in the attacks. The malware infects the devices by brute forcing their passwords. This strategy may work as a consequence of users’ negligence towards password security of stationary devices, which the users do not directly interact with in their everyday life while leaving them exposed to the Internet.

Matthew Prince, the CEO of an Internet infrastructure company Cloudflare said it’s a known issue, “There’s nothing really new about [this type of DDoS attack]. We’ve seen them for at least the last three years, they tend to be difficult to stop”.

Public release of Mirai source code was announced at Hackforums on September 30.

Dyn’s corporate headquarters are in New Hampshire.

Retrieved from “https://en.wikinews.org/w/index.php?title=Distributed_malware_attacks_Dyn_DNS,_takes_down_websites_in_US&oldid=4262407”