www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 

DDoS

Noteworthy

 Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

 We asked IT pros what's at stake during a DDoS attack. Here's what they said about downtime, losing customers and public trust.

 While the danger is hardly over, these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks.

Blogs

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more»

Domain Name System (DNS) Security Should Be One of Your Priorities

Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more»

CircleID's Top 10 Posts of 2013

Here we are with CircleID's annual roundup of top ten most popular posts featured during 2013 (based on overall readership). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2014. more»

Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3)

In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more»

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more»

Tips to Protect eCommerce Website Availability and Security During the Holidays

With the holiday shopping season quickly approaching, Internet retailers are gearing up for an onslaught of Web traffic - which is great, as long as they have the right measures in place to keep their customers safe and satisfied. Even one hour of downtime due to a website outage or a malicious attack can have significant impact on a retailer's reputation and revenue, especially during the holidays, a time which the National Retail Federation says can add up to 40 percent of an online retailer's annual revenue. more»

A Question of DNS Protocols

One of the most prominent denial of service attacks in recent months was one that occurred in March 2013 between Cloudflare and Spamhaus... How did the attackers generate such massive volumes of attack traffic? The answer lies in the Domain Name System (DNS). The attackers asked about domain names, and the DNS system answered. Something we all do all of the time of the Internet. So how can a conventional activity of translating a domain name into an IP address be turned into a massive attack? more»

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more»

5 Steps to Prepare for a DDOS Attack

As more people are realizing that in today's cyber climate Distributed Denial of Service (DDoS) attacks are a matter of when, not if, the most common question I get asked is "What can I do to prepare?" I like to break it down into 5 key steps enterprises can take now to be prepared for a future attack... It would take a book to cover all of these topics in depth. Hopefully this will at least give you, some things to think about and plan for with your DDoS mitigation strategy. more»

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more»

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 1

Many cyber attacks against companies today go unreported, and more still are undetected... Timing and context are everything. The faster a company identifies a problem, and the faster and deeper it is understood and its relevance to the business, the more effectively the company can respond. We call this squeezing the cyber response curve. This two-part post will discuss the current state of cyber threats, what the cyber response curve is and its impact your organization and how you can effectively squeeze this curve to improve attack response. more»

What Smaller Institutions Can Learn from DDoS Attacks on Big Banks

Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs... In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communications.. these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks. more»

Breaking Down Silos Doesn't Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more»

How Will Banks Ensure the Safety of Our Money? DDoS Attacks on NL Banks

This week bank costumers of The Netherlands were shocked when they realised that online banking may not be as safe as they thought. Perhaps some were surprised to hear that what they think is money, is nothing but digits, something that does not exist. Their money only exist because we all act as if it exists and accept transactions between each other aided by software run by banks, if they haven't outsourced that function. more»

Open DNS Resolvers - Coming to an IP Address Near You!

Three vectors were exploited in the recent DDoS attack against Spamhaus: 1) Amplification of DNS queries through the use of DNSSEC signed data; 2) Spoofed source addresses due to lack of ingress filtering (BCP-38) on originating networks; 3) Utilisation of multiple open DNS resolvers While. 1) is unavoidable simply due to the additional data that DNSSEC produces, and 2) "should" be practised as part of any provider's network configuration, it is 3) that requires "you and I" ensure that systems are adequately configured.  more»

News Briefs

US Government Releases Cybersecurity Framework Proposal

Live Data Visualization of DDoS Attacks

Google Launches 'Project Shield': Anti-DDoS Service to Protect Free Expression Online

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

Arrest Made in Connection to Spamhaus DDoS Case

U.S. CERT Issues Alert on DNS Amplification Attacks

Largest DDoS Attack To Date Aimed at Spamhaus Effects Global Internet Traffic

DDoS Attacks on US Banks This Week Peaked at 60 Gbps

DDoS Attacks Increased by 2000% in Past 3 Years, Asia Generating Over Half of Recent Attacks

Feds Shut Down File-Sharing Website Megaupload.com, Seven People Charged

South Korean Ruling Party Chief Offers Resignation Amidst DDoS Scandal

FBI Warns of Cyberattacks Against Banks - Aided by Variant of Zeus Trojan Called 'Gameover'

Report on Today's State of DNS Services

CAUCE Director Neil Schwartzman Wins Prestigious MAAWG Award

DDoS Attack Size Breaks 100 Gbps for First Time, Up 1000% Since 2005

Myanmar Internet Down from Massive DDoS Attack

IPv6 Posing New Security Issues

DNS Survey Results Pandora's Box of Both Frightening and Hopeful Results, Says Cricket Liu

Consumer Modems Worsening DNS Problem Linked to DDoS Attacks

14 ISPs in Netherlands Serving 98% of Consumers Form Anti-Botnet Treaty

Most Viewed

Most Commented

Neustar Updates – Sponsor

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

DDoS attacks have continuously been on the rise and as you may have heard plenty already, more and more attackers are targeting DNS. In the following video, Rodney Joffe, Neustar's Senior Vice-President and Technologist, explain how hardened DNS can keep your business safe. ›››

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, it also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organizations use. ›››

Neustar Launches Global Partner Program

Neustar has launched a new program to allow partners to resell Neustar's cloud-based infrastructure services, including managed DNS and DDoS protection offerings, to their online customers. ›››

Hope is Not a Strategy: Neustar Releases 2012 Annual DDoS Attack and Impact Survey

The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small. ›››

How Neustar Technology Can Help Mitigate DDoS Attacks

Learn about the diverse technologies Neustar uses to Mitigate DDoS attacks quickly and effectively. The seasoned DDoS fighters in the Neustar Security Operations Center explain the need for a full toolset to combat complex attacks. ›››

Neustar Launches Enterprise Professional Services Offerings

Neustar announces the launch of Neustar Professional Services with a comprehensive suite of IT service offerings for enterprise organizations of all sizes. Neustar's seasoned team of professionals provides the expertise and resources organizations need to ensure the performance, security and reliability of their IT infrastructure. ›››

Recent Trends and Options to Mitigate DDoS Attacks (Webcast)

This Monday, December 3, Neustar will hold a webcast to review recent trends in attacks and the most popular methods of mitigation. During the 60 minute webcast, recent attacks will be analyzed as well as implications they have had on DDoS mitigation solutions. ›››

Industry Updates

Participants – Random Selection