What You Need to Know about the Evolution of DDoS
August 15, 2016
In an attempt to define the modern-day DDoS attack, one must understand – there is more than one type of attack. Starting with the simplest first, network level DDoS attacks are the easiest to launch. They are fundamentally designed to crush networks and melt down firewalls. Aimed at filling state tables and consuming the available […]
Advanced Persistent Threats – A Simple Analogy
August 1, 2016
Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS One of the things that amazes me the most is how the general population lacks a firm understanding of the cyber threats they face daily. Since few people outside of security circles have actually been trained in cyber security, the general lack of knowledge pertaining to cyber-attacks […]
Data related to major sporting events vulnerable to hacking
July 11, 2016
Some major sporting events and tournaments are scheduled to take place this year making these events and sensitive data related to the teams participating vulnerable to hacking, according to cyber security researchers. The recent dependency of sport teams, organisations and tournament hosts on mobile, cloud and analytics, make them easy targets for hackers.
Unsung cybersecurity vulnerabilities in US infrastructure and utilities
July 8, 2016
This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use across the U.S. government. According to the report, “The Strategic Automated Command and Control System coordinates the operational functions of the United States’ nuclear forces, such as intercontinental ballistic […]
Wendy’s: Credit card numbers disclosed in cyber attack
July 7, 2016
Fast-food chain Wendy’s said Thursday that customers’ personal information was compromised in a series of cyber attacks that started last year. Wendy’s, which has been investigating “unusual payment-card activity” since early this year, said that cardholder names, credit or debit card numbers and expiration dates are among data targeted in an attack on a point-of-sale […]
The Fully Aware, Hybrid-Cloud Approach
July 6, 2016
For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy. Are they […]
Liar, liar, email on fire: the security value of lie detecting algorithms
June 30, 2016
Researchers have developed a method of identifying linguistic clues in electronic communications that could point to possible cases of deception. Could lie-detecting algorithms reduce the impact of phishing emails?
NSFOCUS Wins 2016 Information Management Award
June 27, 2016
NSFOCUS Wins 2016 Information Management Award NetworkWorld Asia Names NSFOCUS Solution “The Most Promising Cyber Security Solution” Santa Clara, Ca. June 28, 2016 – NSFOCUS, a global network and application security provider, today announced that it has received top honors in the NetworkWorld Asia 2016 Information Management Award for the most promising cyber security solution […]
Stare Into the Dark Side of DDoS Attacks
June 26, 2016
For more than a decade, attackers have used distributed denial of service attacks to disrupt their victims’ operations, often taking organizations completely offline. The motivations behind these attacks include notoriety, competitive advantage, cyber warfare, terrorism, hacktivism and/or extortion. Bandwidth- or resource-saturating DDoS attacks are effective, but today they are not the most common type of […]
Godless Android malware offers serious firepower to a botnet herder
June 24, 2016
One of the most concerning characteristics of the Godless malware is the ability to receive remote instructions on which app to download and install on mobile devices, without the user’s knowledge. This is called command and control (C&C). Being a DDoS subject matter expert, I believe this has the makings of something more insidious than […]