The Past, Present and Future of DNS Security

As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.

The post The Past, Present and Future of DNS Security appeared first on Security Intelligence.

Continue reading The Past, Present and Future of DNS Security

The Past, Present and Future of DNS Security

As the fabric of the internet evolves, security professionals must be aware of DNS security threats, such as DDoS attacks and schemes designed to direct users to malicious websites.

The post The Past, Present and Future of DNS Security appeared first on Security Intelligence.

Continue reading The Past, Present and Future of DNS Security

Looking Ahead: Three Bold Cybersecurity Predictions for 2018

As we wrap up one of the wildest years the industry has ever seen, the IBM Resilient team offered three bold cybersecurity predictions for 2018.

The post Looking Ahead: Three Bold Cybersecurity Predictions for 2018 appeared first on Security Intelligence.

Continue reading Looking Ahead: Three Bold Cybersecurity Predictions for 2018

A Primer on IoT Security Risks

IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.

The post A Primer on IoT Security Risks appeared first on Security Intelligence.

Continue reading A Primer on IoT Security Risks

Is IoT Security an Oxymoron?

As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.

The post Is IoT Security an Oxymoron? appeared first on Security Intelligence.

Continue reading Is IoT Security an Oxymoron?

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.

The post Consequences of IoT and Telnet: Foresight Is Better Than Hindsight appeared first on Security Intelligence.

Continue reading Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

The Internet of Trouble: Securing Vulnerable IoT Devices

In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.

The post The Internet of Trouble: Securing Vulnerable IoT Devices appeared first on Security Intelligence.

Continue reading The Internet of Trouble: Securing Vulnerable IoT Devices

Lessons From the Dyn DDoS Attack

Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.

The post Lessons From the Dyn DDoS Attack appeared first on Security Intelligence.

Continue reading Lessons From the Dyn DDoS Attack