Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing you that they are currently experiencing a cyber attack. Why are they calling you? The attack is coming from your servers.read more
Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.read more
Can You Stay Anonymous While Participating in a DDoS Attack?
Taking part in a Hacktivist group is completely different than being part of a Botnet. In a Botnet, case participants are unknowingly “recruited” to an attack. In the Hacktivist group, case members take part in attack activities on their own accord.
Just this past month, Anonymous hackers in London were jailed for a series of DDoS attacks on PayPal and other payment services such as Visa and MasterCard.
Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts – the Emergency Response Team (ERT) – who’ve seen their fair share of cyber attacks while actively monitoring and mitigating attacks in real-time. In this year’s annual report, our experts have uncovered several new trends in cyber-security worthy of a closer look.read more
An article published in the New York Times last Wednesday touched off a media frenzy by suggesting that Iran has been behind the cyber attacks on US financial institutions taking place since late September of last year. While the questions of forensics and culpability pose a particular challenge when it comes to cyber security, there are a number of unprecedented components to these attacks that should absolutely command our attention.read more
Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the secure platform myths have been busted, we have definitely crossed into new territory this year.
First of all, malware is now very much a mainstream business practice. Years ago, security researchers found exploits and disclosed them to companies for the purpose of fixing the hole. Today, some researchers may still use the same code of ethics, however, there’s profit to be had in return for finding flaws in systems. The buyers of these exploits could be businesses wishing to target each other in competitive infection or spying. Also, being that new cold war strategies of governments include hacking other countries and their resident companies, there is vast profit to be potentially earned by hackers.read more