DDoS attacks are growing: What can businesses do?

How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?
Categories:

Business
Technology

Tags: attackddosDDos attackIoTmemcachedPieter Arntzprotection

(Read more…)

The post DDoS … Continue reading DDoS attacks are growing: What can businesses do?

What is the best way to provide security between two different networks in different locations? [on hold]

My question is how we can protect the network traffic between two different networks with a software solution not with the hardware solutions. The solution can be point to point package encryption or creating a tunnel like vp… Continue reading What is the best way to provide security between two different networks in different locations? [on hold]

What is the best way to provide security between two different networks in different locations? [on hold]

My question is how we can protect the network traffic between two different networks with a software solution not with the hardware solutions. The solution can be point to point package encryption or creating a tunnel like vp… Continue reading What is the best way to provide security between two different networks in different locations? [on hold]

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and mic… Continue reading Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

How can I compare information security management standards between my country and other countries and, suggest better standards for my home country?

I want to compare information security management standards of different countries (USA, Australia, UK and my home country), and I want to suggest better standard for my home country (my home country is following a standard b… Continue reading How can I compare information security management standards between my country and other countries and, suggest better standards for my home country?

Look out for More SMiShing This Year

With the new year come new social engineering threats to users. While many of these threats themselves are not new, the rising frequency and execution of them is worth attention.  SMiShing (SMS phishing) is one of those techniques attackers use th… Continue reading Look out for More SMiShing This Year

ATtiny Chip Abused in RFID Application

One of Atmel’s smallest microcontrollers, the ATtiny, is among the most inexpensive and reliable chips around for small applications. It’s also one of the most popular. If you don’t need more than a few inputs or outputs, there’s nothing better. As a show of its ability to thrive under adverse conditions, [Trammell Hudson] was able to shoehorn an ATtiny into an RFID circuit in a way that tests the limits of the chip design.

The RFID circuit only uses two of the ATtiny’s pins and neither of which is the ground or power pin. The ATtiny is equipped with protective …read more

Continue reading ATtiny Chip Abused in RFID Application