Blog Posts Tagged with "DDoS"


The Forgotten Security Frontier: The Phone Call

January 23, 2017 Added by:Myk Konrad

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Comments  (0)


The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)


Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)


European Businesses Fear DDoS Extortion Attacks: Survey

July 07, 2016 Added by:Ionut Arghire

Cyber-extortion is becoming a booming business, at least for criminals who threaten companies with distributed denial of service (DDoS) attacks, a recent survey from DDoS protection company Corero reveals.

Comments  (0)


Denying the Deniers: Tackling DDoS Attacks

February 17, 2016 Added by:Avishai Wool

As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.

Comments  (0)


Carrier Grade NAT and the DoS Consequences

December 16, 2015 Added by:Stefan Fouant

Through the use of dedicated DDoS mitigation devices, Carrier Grade NAT devices and their associated customers are protected from service disruptions, while still ensuring legitimate traffic is allowed unencumbered.

Comments  (0)


Is DDoS Mitigation as-a-Service Becoming a Defacto Offering for Providers?

November 11, 2015 Added by:Stefan Fouant

In my daily engagements with various customers of all shapes and sizes, it’s truly interesting to see how the approach to DDoS mitigation is changing. Much of this is the result of DDoS mitigation services shifting from a “nice to have” technology to a “must-have”, essential in order to maintain business continuity and availability.

Comments  (0)


Resilience ‒ The way to Survive a Cyber Attack

May 07, 2013 Added by:Jarno Limnéll

In reality, a well-prepared cyber attack does not need to last for 15 minutes to succeed. After preparations it takes only seconds to conduct the attack which may hit targets next door as well as those on the other side of the world.

Comments  (0)


New attacks against banking, cyber Jihad or cyber warfare acts?

December 22, 2012 Added by:Pierluigi Paganini

The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...

Comments  (1)


Clean That Network Traffic

October 31, 2012 Added by:Richard Stiennon

Why not deploy an intelligent appliance behind the router and in front of the firewall? Filter out all the junk before you expend any resources in your firewall, or log all the events with your IDS/SEIM. Reduce your need for multiple servers and load balancers. This is like a reverse osmosis for your network...

Comments  (0)


Prolexic Q3 2012 ... a new generation of DDoS attacks

October 20, 2012 Added by:Pierluigi Paganini

This is significant because very few companies or organizations have the necessary network infrastructure to deal with such attacks. There might be some companies with popular websites such as Google or Facebook that are able to handle such high-bandwidth floods, but most companies are not...

Comments  (0)


How to Protect against Denial of Service Attacks: Refresher

October 03, 2012 Added by:Stephen Marchewitz

In order to mitigate this threat, ISPs will need to combine their efforts. It would take a global effort on the part of the ISPs. Until then, the capabilities are there to deal with the issue when it arises on a per incident basis...

Comments  (3)


The Right to Keep and Bear Cyber Arms

August 29, 2012 Added by:Dan Dieterle

With all the media hype over Stuxnet, cyber war and cyber weapons – should US citizens be legally allowed to own and use these weapons in accordance with their 2nd Amendment rights? Why shouldn’t Americans be allowed to actively defend themselves against online electronic risks as well as physical threats?

Comments  (10)


Application Layer DDoS Attacks Decline in Q2 2012

July 18, 2012 Added by:Headlines

“Q2 data showed a return to traditional infrastructure attacks and is likely a reflection of changing tools for launching DDoS attacks. With Layer 7 attacks, the risk of detection and eventual take down by law enforcement increases because these attacks disclose the IP address of the attacking botnet..."

Comments  (0)


LulzSec Hacker Indicted for Conspiracy to Conduct Cyber Attacks

June 14, 2012 Added by:Headlines

The indictment alleges that Ryan Cleary controlled a large botnet of potentially hundreds of thousands of units to conduct DDoS attacks and would rent out his botnet for certain time periods in exchange for money from individuals interested in conducting DDoS attacks targeting specific victims...

Comments  (0)


Concerns Mount over North Korean Cyber Warfare Capabilities

June 11, 2012 Added by:Pierluigi Paganini

North Korean operatives have been detected launching cyber attacks on Incheon International Airport systems and also spreading a virus planted in gaming programs intended to transform user's machines in zombies for a large botnet to launch DDoS attacks...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked