Tag "DDoS Attacks"

Back to homepage
Industry Insights

DDoS Attack Volumes Increase By 110% In Q3 2018, According To Link11’s New Report

Link11, a cyber security firm, has released its Q3 DDoS Report, revealing that the scale and volume of DDoS attacks continued to grow in Europe during Q3 2018. The Link11

IT Compliance

The Godfather Part 4 – Cybercrime Isn’t Personal, It’s Strictly Business

When many of us hear the term ‘Mafia’, we conjure up the thought of ’wise guys’ of the 1920’s and 30s in pinstripe suits, personified by Al Capone or those

Hardware/Network

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that

Hardware/Network

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Hardware/Network

Automating in Security With Intelligence

Like most security practitioners, I can thank automation for streamlining, expediting, and even replacing many of the tasks and controls that help fend off everything from network intrusions to DDoS

Hardware/Network

The evolution of DDoS attacks – and defences

In October 2016, a new method for distributing DoS attacks emerged – using a network of Internet of Things (IoT) devices to amplify attacks. What is the biggest cyber-threat to

Hardware/Network

Persistent DDoS Attacks Evolve at Internet Scale

Attackers are harnessing the power of the internet, leveraging the proliferation of devices in the ever-expanding internet of things (IoT) to launch terabit-per-second–scale distributed denial-of-service (DDoS) attacks, according to NETSCOUT’s 2018 Threat Intelligence

Hardware/Network

Why You Should Protect Your Business Network Above All Else

By Tiffany Rowe – Content Creator at Seek Visibility, Yes, your computers and servers are where your data is saved; yes, mobile and IoT devices sure are vulnerable; but your

Hardware/Network

What are the Guaranteed Best DDoS Defence Practices?

DDoS is a constantly evolving threat. We are seeing DDoS attacks getting more sophisticated, more frequent and bigger than ever before. The systems that are most common in enterprises today

Software

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as