Imagine a world where smartphones were only upgraded every 15 years. It is hard to imagine waiting that long for new hardware and new functionality to meet consumer expectations and demands. It is even harder to imagine how the update will integrate all the changes in the way people utilize their smartphones.read more
There have been a number of unbelievable data breaches lately and I have been fielding a ton of questions from personal friends and colleagues who are genuinely worried about their personal information and they want to do better with securing their digital life. In an attempt to provide some guidance on how to make better security decisions on the Internet, I’ve honed these ten immutable thoughts for consumer-level security:read more
If you own, operate, or even consume a carrier-grade communications network, it’s a safe bet you are under attack right now. Attack motivations and attack tactics may vary, but one consistency is that high profile, sophisticated attacks on carrier networks are increasing – in both number and severity. Attackers are getting in and causing slow-downs in network speed and performance, service outages and worse.read more
Not long ago, the Radware Emergency Response Team (ERT) noticed significant and increased usage of the Tsunami SYN Flood attack against a large customer. This activity strongly indicated the presence of a service related robot and Radware security researchers managed to obtain a sample of the malware binary used to generate these DDoS attacks. The malware was then isolated and used in a controlled environment to study its behavior and its different attack vectors.read more
DDoS-for-hire has been around for a while. Until recently, “booters” were known as paid online services used by gamers to initiate DDoS attacks against their opponents to gain a competitive advantage.
Now, DDoS attacks can be launched by anybody with a credit card and a motive. No longer exclusive to gamers and hackers, a competitive DDoS-for-hire market has expanded nearly to the point of commoditization.read more
Since HTTP 1.1 was introduced 17 years ago, the Internet has evolved. This evolution introduced many changes, among them the development and delivery of rich content to users. These improvements enhanced the online experience, but did come at a cost – and the currency was performance. Performance challenges that HTTP 1.1 was never designed to handle.read more
In enterprise environments it is common for an application to be hosted by a pool of servers, either physical or virtual. Over time these applications also go through a lifecycle that consists of security patches, maintenance, upgrades to update capabilities, and changes to keep up with trends such as virtualization, consolidation and deployment in a hybrid cloud environment. For scalability, additional servers may also be deployed.read more
Every good hero needs a trusty guide.
Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.read more