11 Security Solutions for Small Business
March 11, 2016
The Business News Daily Cybersecurity is a must for any business with a presence online. Whether you have a website, online accounts or any type of Web-based infrastructure, you are at risk for a cyberattack. The article summed up 11 small-business-friendly cybersecurity solutions, which included DDoS mitigation solution provided by NSFOCUS. To read the full […]
Adobe Flash Player 21.0.0.182 Released to Fix Security Bug Used in Live Attacks
March 10, 2016
Softpedia Adobe’s Flash Player update has been late this time around, but it’s here now, and users have a good reason to upgrade since one of the 18 security holes plugged during this month’s release is an issue used in real-world malware attacks. Most of these bugs were reported by security researchers working in security […]
DDoS Attacks and the Cloud: How the Hybrid Approach Answers Emerging Concerns
March 9, 2016
Track: Technical
Author: Ivan Tirado, Principal Sales Engineer, NSFOCUS
Pure play cloud DDoS mitigation services have seen explosive growth. The market has grown from small outfits protecting online gambling operations, to what is now an accepted approach at large banks and global enterprises in all verticals.
However, as the customer population expands, the set of needs diversifies. Many of these new customers have not experienced a true DDoS attack. (more…)
The Price of Popularity: WordPress Security Woes
March 9, 2016
CMS Wire WordPress is everywhere. According to the latest estimates, 25 percent of all websites around the globe are run on the content management system, which is also one of the most hacked platforms. WordPress sites can be attacked through many kinds of vulnerabilities. The article pinged a number of security experts on the topic […]
Reactions to the KeRanger ransomware for Macs
March 8, 2016
Help Net Security Security researchers have discovered the first fully functional aimed at Mac users. The malware, dubbed KeRanger has been found bundled into the Mac version of the open source Transmission BitTorrent client, and made available for download on the Transmission developers’ official website. Vann Abernethy, our CTO pointed out that these types of […]
Ransomware migrates to Apple Mac computers
March 8, 2016
ComputerWeekly Security researchers have uncovered what is believed to be the first active malware to encrypt Apple Mac computers and demand ransom to unlock them. Our chief technology officer Vann Abernethy said, “as Apple computers and devices become more popular with corporate IT departments, there’s recognition by attackers that valuable data and resources are available […]
DDoS – Best option to get the job done!
February 26, 2016
Track: Technical
Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS
In the world of getting from one place to another, people face a common dilemma. What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best option to get the job done. Something that is reliable, efficient, easy to operate, and affordable. No one likes paying too much. Interestingly enough, a parallel can be drawn in the context of DDoS defenses and the solutions NSFOCUS provides to the cyber-security community. (more…)
When Malware Becomes a Service, Anyone Can Be a Hacker
February 25, 2016
Gadgets 360 A DDoS attack, one of the most popular available attacks has been offered as a service commercially to anyone interested by hacking group. Our senior technical expert Vann Abernethy said “Distributed Denial of Service attacks have been around for a while now, and each year they grow in size, number, and sophistication. We […]
DDoS attacks: how to mitigate these persistent threats
February 25, 2016
CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]
Downstream networks detect Wendy’s breach
February 25, 2016
The Green Sheet Numerous consumers who used credit cards at Midwest and Northeast locations of The Wendy’s Co. in the latter part of 2015 were notified by their card issuing banks of a potential data security breach. Company spokesman Bob Bertini advised news media that fraudulent charges began to appear elsewhere after the cards were […]