Better "Always-On" DDoS Mitigation
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers...
View ArticleRepeat DDoS Attacks the Norm in Q4 2015, 24 Attacks per Target on Average
During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4, reports Akamai in its newly released Q4 2015 State of the Internet – Security Report. Malicious...
View ArticleBangladesh Central Bank Governor Quits Amidst One of the Largest Cyber Heists
Bangladesh's central bank governor has resigned today amidst theft of $81 million from the bank's U.S. account, as details emerged in the Philippines that $30 million of the money was delivered in cash...
View ArticleICANN Fails Consumers (Again)
In its bid to be free of U.S. government oversight ICANN is leaning on the global multistakeholder community as proof positive that its policy-making comes from the ground up. ICANN's recent response...
View ArticleCan Hybrid DDoS Mitigation Stop Large Application Layer Attacks?
We recently received an email from a customer asking about hybrid DDoS mitigation and its ability to stop large application layer attacks. Here's the truth: Hybrid DDoS mitigation works and can stop...
View ArticleIs the FCC Inviting the World’s Cyber Criminals into America’s Living Rooms?
In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese...
View ArticleDNS and Stolen Credit Card Numbers
FireEye announced a new piece of malware yesterday named MULTIGRAIN. This nasty piece of code steals data from Point of Sale (PoS) and transmits the stolen credit card numbers by embedding them into...
View ArticleThe Importance of IPRC in Asia Pacific
I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any...
View ArticleCybercriminals Continuing to Exploit Human Nature, Increasing Reliance on...
Cybercriminals are continuing to exploit human nature and relying on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is...
View ArticleCybersquatting & Banking: How Financial Services Industry Can Protect...
Businesses in the financial services sector are among the most frequent targets of cybersquatters. In this free webinar, I will be joining Craig Schwartz of fTLD Registry Services to provide important...
View ArticleFed Records Indicate Over 50 Cybersecurity Breaches Since 2011, Some Flagged...
The U.S. Federal Reserve ha detected over 50 cyber breaches between 2011 and 2015, with several incidents suspected of "espionage," Reuters reports. The cybersecurity reports, which represent only a...
View ArticleCisco Issues Hight Alert on IPv6 Vulnerability, Says It Affects Both Cisco...
Cisco today released a high-level alert warning about a vulnerability in IPv6 packet processing functions of multiple Cisco products that could allow an unauthenticated, remote attacker to cause an...
View ArticleEthical Hacking: Turning The Tables to Boost Cyber Security
Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States...
View ArticleNearly 1 Million IP Addresses Used by Attackers on a Single Target
Nearly 1 million IP addresses participated in the attack campaign against a financial company. Source: AkamaiAccording to a recent report by Akamai, an analysis of massive Account Takeover (ATO) attack...
View ArticleNASCAR Team Pays Ransomware Fee to Recover Its Critical Files
NASCAR team Circle Sport-Leavine Family Racing (CSLFR) disclosed today a ransomware infection incident that took place in April and nearly caused losing access to critical files worth about $2 million....
View ArticleUS Ramping Up to Defeat Terrorism Online
Obama administration is ramping up its efforts to fight terrorism — "How the US is working to defeat ISIS online" Kristina Wong reports today in the Hill: "Driving the effort is the recently set up...
View ArticleGoogle’s Project Zero Team Discovers Critical Vulnerabilities in Symantec and...
"These vulnerabilities are as bad as it gets," says Google's Information Security Engineer, Tavis Ormandy, in reference to multiple critical vulnerabilities discovered affecting Symantec, a popular...
View ArticleDocumentary Balmes Israel for Stuxnet Malware Failure
Oscar-winning documentarian Alex Gibney's "Zero Days" — coming out on Friday — investigates the story of the classified Stuxnet attack on Iran by the US and Israel. "New film blames Israel for failure...
View ArticleEU Launches First European Public-Private Partnership on Cybersecurity, Plans...
The European Commission has launched a new public-private partnership on cybersecurity expected to trigger €1.8 billion ($2B) of investment by 2020. The action plan includes the launch of the first...
View ArticleSophisticated Maleware Found Aimed to Target Energy Companies
"The threat uses sophisticated techniques to evade detection and prepares the ground for more malware components," Lucian Constantin reporting in CIO: "Security researchers have discovered a new...
View Article