Tag Archives: security

DDoS attackers increasingly strike outside of normal business hours

DDoS attack volumes have increased by 50% to an average of 3.3 Gbps during May, June and July 2018, compared to 2.2 Gbps during the previous quarter, according to Link11. Attacks are also becoming increasingly complex, with 46% of incidents using two or more vectors. While attack volumes increased, researchers recorded a 36% decrease in the overall number of attacks. There was a total of 9,325 attacks during the quarter: an average of 102 attacks … More ? The post DDoS attackers increasingly strike outside of normal business hours appeared first on Help Net Security .

Read the original:
DDoS attackers increasingly strike outside of normal business hours

Week in review: IoT security, cyber hygiene, Social Mapper

Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: ?Choosing your defensive strategy One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. “Our State of the Internet Report found that companies suffered 41 DDoS attacks on average over the last six months,” he points out. August Patch Tuesday forecast: Looking ahead … More ? The post Week in review: IoT security, cyber hygiene, Social Mapper appeared first on Help Net Security .

Taken from:
Week in review: IoT security, cyber hygiene, Social Mapper

Researchers open source tools to identify Twitter bots at scale

Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning algorithms to identify bot accounts across their dataset, Duo Labs researchers also unraveled a sophisticated cryptocurrency scam botnet consisting of at least 15,000 bots, and identified tactics used by malicious bots to appear legitimate and avoid detection, among other findings. The research From May to July 2018, researchers collected and analyzed … More ? The post Researchers open source tools to identify Twitter bots at scale appeared first on Help Net Security .

Read More:
Researchers open source tools to identify Twitter bots at scale

Intensifying DDoS attacks: ?Choosing your defensive strategy

One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. “Over the last six months, our State of the Internet Report found that companies suffered 41 DDoS attacks on average over the last six months,” he points out. The rise and rise of DDoS attacks As Arbor Networks CTO Darren Anstee recently pointed out, DDoS attacks have become a … More ? The post Intensifying DDoS attacks: ?Choosing your defensive strategy appeared first on Help Net Security .

Read more here:
Intensifying DDoS attacks: ?Choosing your defensive strategy

Castaway hacker guilty of sedating children’s hospital computers

He’ll almost certainly get more than a three-hour tour after DDoS strike on medics A self-styled Anonymous hacker who attempted to flee the US in a sailboat has been convicted of two felonies for his role in a 2014 distributed denial-of-service (DDoS) attack on a children’s hospital.…

Read the original post:
Castaway hacker guilty of sedating children’s hospital computers

Free training courses on DDoS protection, from introduction to mitigation

The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. If you’re involved in IT security or network operations, you know that DDoS attacks are a problem that’s not going away. Recent studies indicate that almost 75% of organizations have suffered at least one attack over the past 12 months. What’s inside? This comprehensive quiz-based training course, available at both the Basic and Advanced levels, … More ? The post Free training courses on DDoS protection, from introduction to mitigation appeared first on Help Net Security .

Originally posted here:
Free training courses on DDoS protection, from introduction to mitigation

Threat X extends SaaS-Based WAF solution with threat detection

Threat X announced the addition of capabilities to help global customers identify, profile, and intercept a wide range of threats, including DDoS, Bot and zero-day attacks while increasing application performance. Additionally, cloud-native deployment options mean organizations can deploy and scale Threat X in hours—compared to the weeks associated with traditional WAF deployments. Today, security teams are challenged to protect the large attack surfaces presented by complex technology environments from an ever-evolving threat landscape. These teams … More ? The post Threat X extends SaaS-Based WAF solution with threat detection appeared first on Help Net Security .

See more here:
Threat X extends SaaS-Based WAF solution with threat detection

US senators get digging to find out the truth about FCC DDoS attack

And why serial self-promoter John McAfee is a security expert on Russian hacking Senate Democrats are pressing government officials to explain their claims on election tampering and cyberattacks.…

Original post:
US senators get digging to find out the truth about FCC DDoS attack

Protecting consumers from mobile and IoT threats

A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile and Internet of Things continue to be primary attack vectors, contributing to a spike in cryptojacking, adware, and DDoS attacks. The Telco Security Trends Report is based on anonymous data gathered from four communications service providers (CSPs) across Europe and Israel, who between them, protect seven million customers. It found … More ? The post Protecting consumers from mobile and IoT threats appeared first on Help Net Security .

Read More:
Protecting consumers from mobile and IoT threats

E-voting and DDoS concerns: The devil’s in the details

It’s a typical Wednesday. I’m sitting in the lounge at the Imperva office going through emails when I stumble onto a whitepaper titled Trust Implications of DDoS Protection in Online Elections. “That’s an interesting topic,” I think, and dive in. Coincidentally, this whitepaper turns out to be about our own DDoS protection service, which makes it even more interesting. Reading the document, I quickly realize that I don’t agree with several assumptions and interpretations outlined … More ? The post E-voting and DDoS concerns: The devil’s in the details appeared first on Help Net Security .

Read More:
E-voting and DDoS concerns: The devil’s in the details