• 2015 DDoS attacks on the rise, attackers shift tactics

    News roundup: New research highlights the changing nature of DDoS attack frequency and methodology. Plus: New malware strains double in second half of 2014; two new address bar spoofing vulnerabilities.

    SharonShea585 pointsBadges:
  • DD4BC cyber extortion gang targets key European sectors

    A gang using DDoS attacks to extort bitcoins is now targeting high-profile organisations in key sectors in Europe

    WAshford4,820 pointsBadges:
  • Protecting cloud networks against DDoS and DoS attacks

    DDoS and DoS attacks are simple to implement but more difficult to prevent. How can these attacks on cloud services be avoided?

    SearchCloudComputing3,475 pointsBadges:
  • Most DDoS attacks hiding something more sinister, Neustar warns

    Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar

    WAshford4,820 pointsBadges:
  • DDoS mitigation: Denying denial-of-service attacks

    Employ a mix of internal and cloud-based DDoS mitigation controls to minimize business disruptions from these increasingly complex attacks.

    ComputerWeekly3,555 pointsBadges:
  • How do you handle DDoS attacks in your data center?

    CLongbottom595 pointsBadges:
  • Is DDoS attack mitigation possible at a multi-tenant colo?

    Our small colocation provider's other customers have been under DDoS attacks that affected our infrastructure. The colo null routes the bad IP address; meanwhile, our connectivity is poor.

    CLongbottom595 pointsBadges:
  • DD4B cyber extortion gang ramps up operations

    Cyber criminals using DDoS attacks to extort funds from victims are carrying out more attacks despite a $26,000 bounty

    WAshford4,820 pointsBadges:
  • More than 162,000 WordPress sites used in DDoS attack

    Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites

    WAshford4,820 pointsBadges:
  • What’s the best defense against BlackEnergy malware?

    The BlackEnergy malware has evolved from DDoS launching to a crimeware tool to an APT. Learn more about its changes and new defense measures for combatting the threat.

    searchsecurity23,835 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.