The 10 Immutable Laws of Personal Security on the Internet

There have been a number of unbelievable data breaches lately and I have been fielding a ton of questions from personal friends and colleagues who are genuinely worried about their personal information and they want to do better with securing their digital life. In an attempt to provide some guidance on how to make better security decisions on the Internet, I’ve honed these ten immutable thoughts for consumer-level security:

read more

Reverse Engineering a Sophisticated DDoS Attack Bot

Not long ago, the Radware Emergency Response Team (ERT) noticed significant and increased usage of the Tsunami SYN Flood attack against a large customer. This activity strongly indicated the presence of a service related robot and Radware security researchers managed to obtain a sample of the malware binary used to generate these DDoS attacks. The malware was then isolated and used in a controlled environment to study its behavior and its different attack vectors.

read more

DDoS-For-Hire: A Full Blown Market

DDoS-for-hire has been around for a while.  Until recently, “booters” were known as paid online services used by gamers to initiate DDoS attacks against their opponents to gain a competitive advantage.

Now, DDoS attacks can be launched by anybody with a credit card and a motive. No longer exclusive to gamers and hackers, a competitive DDoS-for-hire market has expanded nearly to the point of commoditization.

read more

What Do You Know About DDoS Attacks? Here’s The Ultimate Guide

Every good hero needs a trusty guide.

Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.

read more

5 Reasons Why Virtual Machine Security Could Become a Larger Threat

The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! What is happening now that is causing us to just get around to finding out about these flaws?

read more

Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative

DDoS attacks are no longer just a nuisance and they can cause lasting damage.  Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year.  The cost of outage?  That can reach nearly half a million dollars per hour.

read more