ddos - News, Features, and Slideshows

News

  • A true story of combating a large-scale DDoS attack

    Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence.

    Written by By Adrian Newby, CTO, CrownPeak15 April 15 05:32
  • Bloody June: What's behind last month's DDoS attacks?

    The list of DDoS attacks in the month of June has made for grim reading. High-profile sites have been targeted by extortion demands, online games got disrupted and at least one company was put out of business as a direct result.

    Written by Jon Gold08 July 14 06:02
  • USENIX: Gamers use DDoS as a service to cheat -- a lot

    Cheating gamers pay as little as $10 per month to launch denial of service attacks against their opponents as a tactical advantage using commercial providers that walk the line between being legitimate businesses that stress-test their customers' networks and purveyors of DDoS as a service, researchers at USENIX Security 2013 say.

    Written by Tim Greene14 Aug. 13 22:16
  • How we can get out of the DNS DDoS trap

    A new class of enormous DDoS attacks emerged March 26 with a DNS reflection attack by email spammer CyberBunker against anti-spam service Spamhaus. The reported traffic peak of 300Gbps was double the previous record.

    Written by David Holmes, technical marketing manager, F5 Networks07 June 13 22:08
  • Cisco-funded startup unveils breakthrough router, targets SDNs

    A Cisco-funded router startup has unveiled its first product, which the company says implements breakthrough silicon-to-photonics circuitry for scaling service provider networks and enabling them for software-defined networking (SDN).

    Written by Jim Duffy12 March 13 13:37
  • Cybersecurity challenges in 2013

    The security issues affecting businesses are similar around the world. Most involve employees innocently bringing an infected personal mobile device into the corporate network, or clicking on a social media link that looks harmless but hides a Trojan or worm that will secretly steal data and money and, potentially, remain undetected with severe impact on security of the infected device.

    Written by Dmitriy Ayrapetov, director of product management of Dell SonicWALL08 March 13 21:14
  • Akamai brews up more delicious Kona security tools

    Web acceleration company Akamai today announced Version 2.0 of its Kona Site Defender service, which adds new ways for clients to protect themselves against denial-of-service attacks.

    Written by Jon Gold25 Feb. 13 12:00
  • DNS reveals the top cyberthreats of 2012. And you guessed it ... no one is safe.

    Our team at Nominum recently looked at the biggest threats to fixed networks at the DNS layer. Why the DNS layer? Because it is ubiquitous -- every network runs on it -- and it is the best option for protecting critical infrastructure.

    Written by Craig Sprosts, vice president of platforms and applications at Nominum22 Feb. 13 23:13
  • Enterprise security testing: What are you missing?

    For all the advances in enterprise networking over the years there's been one big step backward: security testing. Relatively few enterprises today conduct regular security tests in-house, relying instead on occasional tests by outside consultants or, more dangerously, just taking vendor claims at face value.

    Written by Aswath Mohan, director of marketing, Spirent Communications12 Dec. 12 15:13
  • 10 tips for implementing IPS securely

    An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack.

    Written by Phil Lerner, VP technology, Stonesoft Americas26 Nov. 12 19:00
  • DDoS attacks bolster cloud website optimiser

    Enterprise product in the making and ‘loved’ by disbanded hacker group LulzSec.

    The constant and very real threat of distributed denial of service
    (DDoS) attacks aimed at headline grabbing “hacker” groups, such as
    Lulz Security and Anonymous, have helped one tech start-up pick up new
    business.

    Written by Liam Tung28 June 11 12:22
  • Wordpress whacked for second day by DDoS attack

    For the second day in a row, blog-hosting giant WordPress.com suffered a distributed denial-of-service attack that it was able to cut off quickly. The motive remains a matter of speculation.

    Written by Tim Greene05 March 11 09:28
[]