A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.
According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.
Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.
Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.
It’s hardly surprising that DDoS attacks finally caught the attention of politicians; it was just a matter of time until a DDoS attack affected a government agency. A combination of events has led to more awareness of cyber threats, including DDoS attacks.
When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.
Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.
The British House of Commons issued a report last week, indicating the possibility that hackers from Russia or China launched a DDoS attack that crashed the United Kingdom's voter registration website before the deadline to register for the historic Brexit vote. Was that the likely cause of the crash, and could something similar happen in the US?
If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.
Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.
A recent study by BitDefender showed that 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. Companies must realize that DDoS attacks are often part of the toolkit for cyber criminals to launch a security breach.
Anti-DDoS technology has often been difficult or costly for individual organizations to deploy. Fortunately, DDoS defense solutions have evolved, enabling hosting providers and ISPs to offer affordable DDoS protection to their customers.
As sophisticated DDoS threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. Analysis of past events is valuable to help prepare for future threats.
A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.
Some companies are keenly aware of attacks on their networks, but other companies are not. Even in some companies that have dedicated IT security staff and systems in place, major security breaches have occurred. It can take months or even years for an organization to realize that it has been breached.
To avoid experiencing similar incidents, companies need to pay close attention to the network settings for their IoT devices and, where possible, separate them from access to the Internet and to other devices.
Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.
Anti-DDoS solutions have evolved dramatically over the past few years, so it’s surprising to see occasional articles that still recommend outdated approaches, such as remote black holing (also called null routing) to stop unwanted traffic.
Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.
DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.
Security researcher Brian Krebs believes he has unraveled the mystery of who launched a massive Mirai botnet DDoS attack on his site in September of 2016. If Krebs’ allegation is true, then this is a seamy tale of a good programmer who went bad: a white hat turned into a black hat.
On its own, a DDoS attack is not a security breach; however, it can pose a serious data security risk for hosting providers and others. Learn why IT security teams cannot afford to ignore DDoS threats, no matter how small the attacks may be.
Most hosting providers experience DDoS attacks on a nearly daily basis, even if they are typically not volumetric attacks that drag down an entire network. When a hosting provider gets hit with a volumetric attack, the ramifications can be far-reaching and long-lasting.
Law enforcement is at a disadvantage against hackers, mostly because distributed denial of service (DDoS) attacks leave little or no trace of evidence. However, police have made some arrests recently, which counts as a tiny bit of progress in the uphill battle against cyber criminals.