main

Security

Can your SEO rankings be lowered by a DDoS Attack?

January 24, 2017 — by David Hobbs2

seo-ddos-attack-960x714.jpg

Last week, I was doing research in the DarkNet marketplaces to keep on top of the current trends in the threat landscape. One of the advertisements that struck me as typical was an advertisement for a DDoS botnet for rent. It wasn’t that there was a botnet for rent, as those are everywhere. It was the Listing Details that put together a value proposition for attacking somebody that caught my eye. It says:

“Another advantage of the DDOS attack that you probably don’t know is the loss of Google Organic Ranking. Google really don’t like unreachable URLs or slow website. As soon as they find a decrease of availability or speed, your target will be temporary removed from results and then it will lose his Google ranking. Two weeks after a four days DDOS attack, I have seen a website going from first page to third page.”

Security

The Current Surge of Bitcoin Prices

January 11, 2017 — by David Hobbs1

bitcoin-surge-960x640.jpg

It has long been known that if you want to participate in the Darknet marketplaces, you’ll need to exchange your money into Bitcoin.  Bitcoin was written by someone using the alias Satoshi Nakamoto in 2008 as an anonymous and decentralized currency. We’ve written in the past about how to buy Bitcoin. Today, for various reasons, we are seeing it become mainstream.

Ransom attacks on companies are becoming big business. Many businesses say they will not pay, but when attacked, find that they do.  But how do they pay?  Bitcoin. Just like having insurance policies, companies are now investing in keeping Bitcoin around for business continuity against DDoS attacks as well as Malware CryptoLocker and Data Extortion attacks.

Security

Nine Questions to Ask to Determine IoT Device Safety

December 14, 2016 — by David Hobbs0

internet-of-things-960x640.jpg

The holidays are almost upon us.  All around the globe, people are purchasing the latest and greatest gadgets as gifts. Consumers will be linking their new of Internet of Things (IoT) thermostats, doorbells, baby monitors, security cameras, home appliances and even GPS pet trackers to the internet in droves.

On the heels of the holiday season, the International Consumer Electronics Show will take place in Las Vegas, Nevada,  where device manufacturers reveal a whole new crop of IoT devices set to hit the market in 2017.  Amazon.com now has a team of “Smart Home” consultants who come to your house to help you wade through automation, Wi-Fi, ZigBee, Alexa and a sea of other “things” for your homes.

Attack Types & VectorsSecurity

Can a CDN Stop Cyber-Attacks?

February 26, 2015 — by David Hobbs6

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons of DDoS to how bad actors can use free services to create astronomical billing issues.  CDNs are often used as a mask, to levy API abuse and web reflector attacks that plague the Internet via bots and scrapers.  Today, it is estimated that 65% of the traffic on the Internet is from such abuse.  If you were to reflect on that idea, would you think that a CDN can protect you?  That is the falsehood that is often believed.

Security

Is Your Home (Network) Haunted? The Threats of the Ghost Vulnerability and the IoT

February 5, 2015 — by David Hobbs0

Recent vulnerabilities have surfaced that have opened up interesting debates and spirited discussions regarding what I see as vulnerabilities in embedded Linux systems.  Devices that are considered part of the “Internet of Things” (IoT) have embedded Linux and this can make it fairly easy for hackers to compromise home networks.   

DDoS AttacksSecurity

Can Your Business Meet the Demands of Cyber-Ransom?

September 25, 2014 — by David Hobbs1

Online criminality has become a big business and new faces of social engineering and fraud are sweeping the globe. News articles regularly report on major breaches and outages, but rarely, if ever, do we see the underlying ransom demands that are presented before a business is attacked. The stand that organizations often take is that they do not negotiate with terrorists or pirates. But this approach, while noble, can become costly to a business, some may lose everything.

Attack MitigationDDoS AttacksSecurity

Cyber Attacks on Oil and Gas

July 11, 2014 — by David Hobbs1

A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a Russian hacking group and it targeted oil, gas, power, and energy investment companies. The threatening malware had the ability to shut down major power grids, oil pipelines, gas, and energy traders. Analysts speculate that the attack motive was to gain competitive advantage in state-sponsored espionage against global oil and energy producers.