Recently, I wrote an article for Help Net Security to discuss the modus operandi of cybercriminals and how this can lead to different types of cyber attacks. While we have previously encountered huge distributed denial of service (DDoS) attacks that appear to come from nowhere and flood the victim’s network security, we have begun to see much more stealth and more sophisticated attacks causing just as much, if not more, damage.read more
With an estimated viewing audience of over 3.2 billion globally, the 2014 World Cup draws a large amount of viewers to television screens around the world and it brings a fair amount of advertisers as well.read more
Does mobile mean a handheld device in today’s world? Not necessarily. The term ‘mobile’ often applies to a phone or even a laptop computer, but in my opinion the definition is changing. Mobile is no longer something you carry, but rather somewhere. The place that you access your systems and the Internet (which is not from an internally managed LAN and doesn’t include a PC on the other end), this is mobile. And this broader category can extend to devices such as Internet accessible cars and the ‘things’ of the Internet-of-Things (IoT) – TVs, gaming consoles, fancy refrigerators.read more
Ever since Google announced that page speed is a factor in its search ranking algorithm back in 2010, there has been rampant speculation as to how Google gathers performance data and how much SEO impact this data has. Google recently announced changes to Googlebot that some people speculate could pave the way for the web crawler to gather more nuanced performance metrics for the sites it crawls — and ultimately make performance a more critical ranking factor.read more
The effectiveness of DNS Reflective attacks over the past two years has raised the popularity of other reflective attacks, such as CHARGEN and Network Time Protocol (NTP) attacks. In the case of CHARGEN attacks, service is spoofed into sending data from one service on one computer to another service on another computer creating an infinite loop that results in a denial of service attack. Similarly with NTP attacks, an attacker sends a specially crafted query that ultimately redirects large volumes of traffic. The traffic is sent with a spoofed source address with the intention of having the NTP servers return responses to the spoofed address.read more
During a recent info-security event I had some great discussions about cyberwar, the impact of DDoS attacks and, consequently, the key criteria for implementing protection from these attacks.
For those of you searching for DDoS protection, here are things to consider when choosing a solutionread more
Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.
While there is still work to be done, Software-Defined Networking (SDN) is making steady strides towards achieving the viability and maturity needed to become a foundational element of networking in both enterprise and service provider settings. One of the key indicators of progress has little to do with the basics of SDN technology itself, but with the growing number of applications designed to leverage and interact with SDNs. This is creating a “pull” that is every bit as important as the “push” of revolutionary infrastructure technology.read more
Nearly every one of us has had some sort of social engineering or "Phishing" scam attempted on us and some of us, unfortunately, have even learned the lessons from the scam the hard way. I know how excited I was the first time somebody wanted to share $8M dollars with me from my long lost Uncle Frederick Hobbs IV, heir to the estate of the late Frederick the Great or some other nonsense. I immediately daydreamed about what color the new cool car I would buy with cash would be.read more