main

Attack Types & VectorsDDoSSecurity

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

May 1, 2018 — by Carl Herberger0

attack-mitigation-system-960x727.jpg

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world.

Security

Smart Homes of Tomorrow – Connect all the things!

April 26, 2018 — by Daniel Smith0

connect-all-the-things-960x640.jpg

Intro

In 1957 the Monsanto House of the Future was constructed at Disneyland in Anaheim, California. This house was constructed by Monsanto, Massachusetts Institute of Technology and Walt Disney Imagineers to provide visitors with a tour and an idea of what future homes might look like in 1986.

Monsanto House of the Future. Source: Yesterland.com

Design concepts in the Monsanto House of the Future included Ultrasonic dishwashers, a central panel for a zone-controlled climate system, bathroom vanities with a push button headset, closed circuit television receivers for security and built-in stereo systems.  Simply put, the smart home of the past was the idea of mechanically automating everything with a push of a button.

Closed circuit television receiver in Monsanto’s House of the Future. Source: https://www.youtube.com/watch?v=sk2YBA_oa1A

NFVSDNSecurity

5G Security Challenges and Ways to Overcome Them

April 19, 2018 — by Fabio Palozza0

5G-security-960x640.jpg

As the world waits for the introduction of 5G networks, the industry gears up to address the security challenges that may accompany 5G. The 5G networks would essentially promote the use of a huge number of interconnected devices, a tremendous increase in bandwidth, and collaborative functioning of legacy and new access technologies. Undoubtedly, the upcoming 5G environment would demand the deployment of additional security mechanisms to ensure business continuity. 5G systems are meant to be service-oriented, which is why it is important to address the security challenges appropriately and to focus on instilling stronger security and privacy settings in 5G networks.

Attack Types & VectorsSecurity

Entering into the 1Tbps Era

March 8, 2018 — by Daniel Smith0

memecached-960x540.jpg

Background

On February 27th Radware noticed an increase in activity on UDP port 11211. As other organizations began to disclose a trend in UDP amplified attacks over UDP port 11211, Radware’s ERT Research team and the Threat Research Center began preparing for the inevitable. With a Bandwidth Amplification Factor (BAF) ranging between 10,000x and 52,000x, we knew that due to this exposure and publication that attackers would be quick to adopt this method and could easily reach volumes well over 500Gbps.

Attack Types & VectorsSecurityUncategorized

A Quick History of IoT Botnets

March 1, 2018 — by Radware0

history-of-iot-960x640.jpg

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These devices feature sensors and an IP address for Internet connectivity, enabling these objects to collect and exchange data while allowing users the ability to automate or control their devices.

Attack Types & VectorsSecurity

Is My Smart Home Telling People What I Do Every Day?

February 13, 2018 — by Mike O'Malley1

smart-homes-iot-960x640.jpg

2017 will forever be known as the year that the smart home started to take off.  Researchers estimate that Amazon has sold over 15 million Echo devices  to date. Plus, Google has sold another 5 million Google Homes.  The overall smart home market is expected to grow to over $50 billion by 2022.  Already 1 in 4 U.S. households has some kind of smart device in their home.  With all the smart thermostats, smart fridges, smart light bulbs, smart doors and windows, personal assistants, and smart home surveillance, internet-connected home devices are rapidly stacking up in U.S. households. These devices are adding convenience and efficiency, but are they safe?