It’s fun to predict what may happen over a year in security. The industry moves so fast and while some things do stay the course, it only takes one small catalyst to spark a new direction that nobody could have predicted.
There are many predictions already for 2016. Radware has our own, which will be released soon as part of our annual Global Application & Network Security Report. In the meantime, I wanted to share some other predictions made by other industry colleagues that piqued my personal interest.read more
Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on the rise. The odd of success are in the attacker’s favor because these attacks rely on uniquely human factors that are notoriously exploitable.
Phishing attacks have evolved throughout the years and in the past, they were simple attacks. Attackers would send a message with a link to a bogus site to trick a user into running malicious code on their computer. Today, however, phishing attacks are highly complex and the damage to the victim can be extremely severe and even irreversible.read more
I took my car in for some work a while back. They had to replace a gasket on the engine because it was leaking a bit of oil. When they looked at the problem, they told me that I should replace a few other parts.
This was interesting because the parts were working and not causing any issues. The parts they wanted to replace were reasonably inexpensive, but in order to get to the failing gasket they had to spend a lot of time taking apart the engine. The time and labor to dismantle my engine outweighed the cost of the parts that they recommended replacing. It made sense to do this other work at the same time while they were easy to access. In the long run, this would save me money by not having to take apart the engine later when these components would eventually go bad.read more
There were no “common” DDoS attacks in 2015. The ones studied by Radware researchers were often volumetric; however, sophisticated, combined attacks such as Proton Mail were also fought by the Radware Emergency Response Team (ERT). The combined attacks they experienced involved UDP floods, SYN floods, DNS reflection, ICMP floods and TCP out-of-sequence floods.read more
It is easy to know when there is an outage. Things do not work, people complain, and businesses lose money. It is much harder to know when an application is working, but in a sub-par manner. These scenarios are harder to identify and fix. Ultimately, these degradation situations may be costing the company more money than the outages.read more
Over the past twelve months, our team of authors has offered advice, expertise, and analysis on a variety of topics facing the application delivery and security communities. The articles below are the most read and shared ones we published this year. Our goal was (and is) to share our experience and knowledge so you, our readers, can better prepare, implement, and gain insights that you can apply to your business.read more
This holiday season, I purchased most of my gifts online. The process was easy and informative every step of the way. From browsing the items and pictures on the various websites to checking out and tracking the shipments, everything was automated and coordinated. I had to do little but sit and relax with all the time that I would have spent driving from store to store and fighting the holiday crowds.read more
Since Monday December 14th, Turkey’s DNS servers, ns1.nic.tr – ns5.nic.tr, have been the target of a persistent denial of service attack. This 40Gbps amplification attack targeted all 5 nic.tr servers and saw peaks close to 200 Gbps. The attack left more than 400,000 websites down in Turkey and DNS servers unable to respond to queries.read more