Despite precautions, DDoS attacks becoming more dire, damaging
March 14, 2016
Third Certainty The daily rounds of DDoS assaults launched by ideologues and extortionists continue to rise in magnitude, while sucking up vast amounts of the Internet’s bandwidth. This is continuing even as companies and organizations are spending millions to defend against such attacks. Steve Gates, our Chief Research Analyst said business owners considering anti-DDoS technology […]
Slew of dangerous Adobe Flash flaws patched
March 11, 2016
IT NEWS Adobe has issued patches for 21 serious flaws in its Flash Player software to address critical vulnerabilities that could potentially allow attackers to take control of victim’s systems. Researchers from multi companies including NSFOCUS, also discovered a heap underflow vulnerability in Adobe Flash and eight memory corruption bugs – all of which allow […]
11 Security Solutions for Small Business
March 11, 2016
The Business News Daily Cybersecurity is a must for any business with a presence online. Whether you have a website, online accounts or any type of Web-based infrastructure, you are at risk for a cyberattack. The article summed up 11 small-business-friendly cybersecurity solutions, which included DDoS mitigation solution provided by NSFOCUS. To read the full […]
Adobe Flash Player 21.0.0.182 Released to Fix Security Bug Used in Live Attacks
March 10, 2016
Softpedia Adobe’s Flash Player update has been late this time around, but it’s here now, and users have a good reason to upgrade since one of the 18 security holes plugged during this month’s release is an issue used in real-world malware attacks. Most of these bugs were reported by security researchers working in security […]
DDoS Attacks and the Cloud: How the Hybrid Approach Answers Emerging Concerns
March 9, 2016
Track: Technical
Author: Ivan Tirado, Principal Sales Engineer, NSFOCUS
Pure play cloud DDoS mitigation services have seen explosive growth. The market has grown from small outfits protecting online gambling operations, to what is now an accepted approach at large banks and global enterprises in all verticals.
However, as the customer population expands, the set of needs diversifies. Many of these new customers have not experienced a true DDoS attack. (more…)
The Price of Popularity: WordPress Security Woes
March 9, 2016
CMS Wire WordPress is everywhere. According to the latest estimates, 25 percent of all websites around the globe are run on the content management system, which is also one of the most hacked platforms. WordPress sites can be attacked through many kinds of vulnerabilities. The article pinged a number of security experts on the topic […]
Reactions to the KeRanger ransomware for Macs
March 8, 2016
Help Net Security Security researchers have discovered the first fully functional aimed at Mac users. The malware, dubbed KeRanger has been found bundled into the Mac version of the open source Transmission BitTorrent client, and made available for download on the Transmission developers’ official website. Vann Abernethy, our CTO pointed out that these types of […]
Ransomware migrates to Apple Mac computers
March 8, 2016
ComputerWeekly Security researchers have uncovered what is believed to be the first active malware to encrypt Apple Mac computers and demand ransom to unlock them. Our chief technology officer Vann Abernethy said, “as Apple computers and devices become more popular with corporate IT departments, there’s recognition by attackers that valuable data and resources are available […]
DDoS attacks: how to mitigate these persistent threats
February 25, 2016
CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]
Utilities Lack Visibility to Prevent All Attacks, Research Shows
February 10, 2016
eWeek As reports of attacks against energy utilities emerge, there is some evidence that they aren’t properly secured, two separate studies show. NSFOCUS report analyzed that the malware which has been implicated in the Ukraine outage shows that the attack didn’t necessarily use an exotic zero-day vulnerability. The report concludes that a Trojan called BlackEnergy […]