Hacks

Public Education Around Cyber Security

Australia’s Prime Minister Malcolm Turnbull recently raised the issue of cyber security education during a Washington D.C. speech. The intention behind such a sentiment is a...

5 Reasons Why Kids Are Hacking Schools

Summertime is almost over, and back-to-school season is upon us. Beginning now, students all across the globe are beginning to register for their classes,...

5 ways hackers market their products and services

Hackers all over the internet today are slowly adapting to the changes in the attack marketplace. Many notorious DDoS groups like Lizard Squad,...

Buy Me Some Peanuts and Database Hacks

It’s late July and the ‘boys of summer’ are in full swing, if you’ll pardon the pun. I’m a huge baseball fan and love...

School Networks Getting Hacked – Is it the Students’ Fault?

School networks are increasingly becoming victims of cyber-attacks. They are presented with unique threats and challenges that most organizations do not have to deal...

Fraud on the Darknet: How to Own Over 1 Million Usernames and Passwords

Over the last several weeks, we have all become conditioned to mega leaks. 117 million from LinkedIn, 360 million from MySpace, 68 million from...

The Alpha, The Beta and The Omega: A Cyber Security Fairy Tale

There once was a big, big, company who had many powerful subsidiary companies, some of which were acquired and some of which were part...

How Mark Zuckerberg’s LinkedIn, Twitter and Pinterest Accounts Were Compromised.

It didn’t take long for a big name celebrity to be compromised in one of the recent data dumps due to password reuse. I...

Has TeamViewer Been Hacked?

Over the last month there have been numerous TeamViewer users reporting unauthorized access into their computers that resulted in financial loss and stolen credentials....

Is Your Data Secure From Hackers?

Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Transport Layer Security (TLS)...

Hacktivists Using SQL Injections to Target Government Data

Over the last year, hacktivists driven by ideological differences have targeted government data around the world at a persistent rate. The lines are blurred...

You’ve Been Clickjacked!

So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting,...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.