Tag "DNS"

Back to homepage
Hardware/Network

IoT devices using CoAP increasingly used in DDoS attacks

IoT devices in synchronised attacks on targets represent a growing part of global Distributed Denial of Service (DDoS) weapon arsenals. There is a significant potential for attackers to use an

Software

A Hackers Take On Blockchain Security

One of the leading factors of the blockchain—aside from the obvious decentralization—is the high level of security behind it. It’s not uncommon to hear people claim that it is “unhackable.”

Software

Email authentication use growing steadily in every industry sector

U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many organizations remain susceptible because they’re

Software

Why Fixing The Internet Isn’t That Hard

The Internet is a scary place right now, similar to the old American Wild, Wild West, where well-armed gangs of bad guys faced off with common town folk, taking and

Software

DNS flag day: Will your website survive the domain doomsday?

With malicious actors finding innovative ways to take down the DNS and the landscape growing more problematical, the stakes are high but the outcome remains simple: no functioning DNS, no

Hardware/Network

7 Real-Life Dangers That Threaten Cybersecurity

Cybersecurity tends to focus on dangers that appear on networks or in messages. The attackers may be half a world away, so the threat is the only thing that matters.

Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Hardware/Network

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Finding a needle in a haystack is hard, but it’s nothing compared to finding a single piece of hay in the haystack that was put there with malicious intentions.As Verisign

Hardware/Network

Securing campus networks became more challenging

The results of a global Infoblox survey on the state of network security at higher education institutions reveals that 81 percent of IT professionals believe securing campus networks has become

Software

Cyber security vulnerabilities: What’s causing them and what can be done?

Cyber vulnerabilities and attacks can occur for a variety of reasons.According to a recent study, based on the results of attendees at Black Hat USA 2018, infosec professionals cited cyber security