The End of Windows XP

April 11, 2014 — by David Hobbs2

Windows XP support has ended and there will be no more patches.

This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer receive automatic security updates or protection against new viruses. This means that the 12 year-old system could leave behind security holes for users who haven’t upgraded.

Attack MitigationBotnetsSecurity

The Ride from RSA 2014 & Taxi Wars

March 6, 2014 — by David Hobbs0

The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it.  The only void I noticed among the technical vendors was addressing the issue of hacktivism.  In the packed conference and crowed exhibition halls, I never came across a discussion about this phenomenon.  Can we forecast this risk?  Do we know its long term effects?  I think most of us are still befuddled by this concept. 

Attack MitigationDDoS AttacksSecurity

Inside the World of Hacker Reconnaissance

March 19, 2013 — by Eyal Benishti1

The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have embraced this line of thought and invested their efforts in reconnaissance and meticulous preparation during the "pre-attack" phase. Drawing from attacks handled by our Emergency Response Team (ERT), Radware recently conducted research on the ways in which pre-attack planning and detailed preparation dramatically increases the potency and success rate of attacks.

Application SecurityAttack MitigationDDoS AttacksHTTP Flood AttacksSecurity

Stock Exchanges in the Line of Fire

March 6, 2013 — by Ziv Gadot0

During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks." Based predominantly on my experience as part of Radware’s Emergency Response Team (ERT) that provides 24/7 DDoS attack mitigation support, I focused on three specific topics:

Attack MitigationSecurity

From Defense to Offense – Three Steps to Successful Attack Mitigation

October 19, 2012 — by Ronen Kenig1

In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions in the United States. While these two different types of attacks, one physical and one electronic, share similar targets, both were met with two very distinct mitigation strategies.

In the case of the Federal Reserve, undercover federal agents took a proactive posture. The public was never in danger because agents led the attacker to believe he was given real bomb making materials. However, in the case of the bank cyber attacks, despite prior knowledge of being targeted for DDoS attacks, banks have been on the defensive, scrambling to stop the hemorrhage disrupting their operations. The lesson here is clear – a strong offense is the best defense against hackers.

Attack MitigationDDoS AttacksSecurity

Cyber Monday: A Hacktivist’s Dream Come True?

November 2, 2011 — by Carl Herberger0

So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named attacks there are two additional attacks which are scheduled to take place over the coming days, one against and the other against (although the latter has been renounced by the ‘main faction’ of Anonymous).