main

Security

Radware’s Top Blogs of 2016

January 5, 2017 — by Radware0

top-5-posts-2016-960x577.jpg

Happy Near Year! Another year has come and gone in the blink of an eye. 2016 brought with it several interesting threats and attacks in the cyber-security space, among them the largest DDoS attack in history, the enslavement of Internet of Things (IoT) devices by botnets, the rise of cyber ransom and more – all of which we have dutifully reported here on the Radware Blog.

You, our readers, are what drive our dedication and commitment to industry insight. So what did you think of 2016? We’ve compiled a list of the top 5 blogs you most loved from last year.

Security

Darknet: A One-Stop Shop for Would-Be Criminals

December 29, 2016 — by Radware0

darknet-roundup-960x641.jpg

There has been much talk in 2016 about the Darknet, a dangerous place where illicit or underground activities are conducted and consisting of many digital marketplaces where items can be bought or sold for cryptocurrencies. It sounds like the stuff of crime novels, and in a way, it is – commodities like drugs, guns, and cyber-attack services can all be found if you know where to look. The below blogs from ERT Researcher Daniel Smith will provide more information on what exactly the Darknet is, how to access it, and what can be found there.

Attack Types & VectorsSecurity

The Rise of the Internet of Things (IoT)

December 28, 2016 — by Radware0

iot-roundup-960x641.jpg

Unless you have been living under the proverbial rock, you probably heard about a number of Internet of Things (IoT) attacks this fall, beginning with KrebsOnSecurity, then OVH, then the DDoS attack on Dyn DNS. All of this started with a bot called Mirai, and involved IoT devices. Why is this important? By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. A survey by HP indicates that about 70% of these devices have vulnerabilities, making them the perfect targets for botnets like Mirai.

Attack Types & VectorsSecurity

2016: The Year of Cyber Ransom

December 27, 2016 — by Radware1

cyber-ransom-roundup-960x640.jpg

In 2015, we made a number of predictions for the upcoming year. One of the bigger predictions was that we would see the continued rise of ransomware and RDoS (ransom-denial-of-service) attacks. When we look back at the year, we were right – 56% of companies we surveyed reported being threatened in this manner.

Because these attacks have become so prevalent, it’s important to understand the motives behind them, and how to protect your organization. Below is a round-up of some of our most popular blog posts to bring you up to speed on this threat:

Attack Types & VectorsSecurity

Millennials Most Likely to Pay a Ransom When Data is Digitally Hijacked

December 20, 2016 — by Radware0

cyber-ransom-960x672.jpg

How much someone is willing to pay in a ransom attack varies greatly by age, with younger consumers likely to pay more.

That’s one of the findings in a new study among over 2,000 U.S. adults conducted online on behalf of Radware by Harris Poll. It’s not a great sign after a year when ransom attacks locked up patient records at hospitals and disabled MUNI ticket machines in San Francisco. The attacks included ransomware, ransom DDoS, and other threats designed to extort money from unprepared organizations. Many variants arose, including Locky and Petya that propagate through spam emails and phishing, respectively; Samas, which exploits webserver vulnerabilities; and Cerber, which imitates an Adobe Flash player update.

Attack Types & VectorsSecurity

IoT Botnets the Fault of Manufacturers, 69 Percent of Consumers Report in Radware Survey

December 15, 2016 — by Radware0

internet-of-things-connected-960x640.jpg

Who is to blame when hackers take control of thousands of internet-connected devices to carry out a DDoS attack?

That’s what security researchers have been asking since the Dyn attack hamstrung dozens of major websites in October. Using the Mirai malware, hackers harnessed 100,000 internet-connected devices in a DDoS attack that reportedly reached 1.2 Tbps. Those devices, from cameras to DVRs, are often consumer-owned, and we wanted to see what consumers thought of their devices being co-opted for these attacks.

We asked them where they’d point fingers if their devices are compromised and used as part of an IoT botnet.

Security

Cyber Security Recommendations from the C-Suite

November 22, 2016 — by Radware0

c-suite-recommendations-960x557.jpg

Security executives have a lot on their plate. They’re grappling with a new breed of cyber-attacks, financially-motivated cyber assailants, and a bevy of new, connected devices (both corporate and employee) that bring unintended security risks to their organization.

But it’s not all doom and gloom. C-level executives are relying on new technologies and best practices to fight fire with fire. They’re turning to former enemies for help, getting more bang for the buck, and relying on automation to safeguard their organization’s most critical information assets.

HacksSecurity

Headaches for the Holidays

November 4, 2016 — by Radware0

Retail_Cartoon_v2-960x878.png

We’re fast approaching the biggest holiday shopping season for retailers. Just how big? According to the National Retail Federation’s annual consumer spending survey, consumers plan to spend an average of $935.58 each this holiday season in 2016. What’s more, 41% of consumers plan to start their shopping this month. Every year, consumers entrust their financial and personal information (everything from credit card data to home addresses) to retailers both big and small. But are these stores doing enough to keep their customers’ data safe?

Security

Internet of Things or Internet of Threats?

November 2, 2016 — by Radware0

internet-of-things-1-960x640.jpg

When we talk about interconnection, we usually think in terms of computers, tablets and smartphones. The Internet of Things (IoT) describes a world where just about anything can be connected and communicate in a “smart mode” by combining simple data to produce usable intelligence. With the IoT, the physical world is becoming one big information system with the ultimate goal of improving quality of life and empowering new business models.

However, this also means that more personal information and business data will reside in the cloud and be exchanged between thousands of devices that may have exploitable vulnerabilities. One weak link in the security chain could provide hackers with nearly limitless doorways that could be unlocked and lead to sensitive information.

DDoSHacksSecurity

Is Your Child Hacking Their School?

October 7, 2016 — by Radware0

Radware_Kid_Hacking_Comic_Strip-2-960x425.png

You might be surprised at who is behind the most recent cases of cyber-attacks on schools. Would you guess that in many cases, it’s the students themselves? Whether because they want to change their grades or attendance, because they feel it’s fun or they want to test the limits of how much they can get away with, it’s becoming a larger problem across the globe. Part of the issue is the ease in which kids can now access the Darknet, and the increasingly low costs to hire someone to hack the system for them.