Press enter to see results or esc to cancel.

Are you a victim of DDoS attacks?

Distributed denial-of-service (DDoS) attacks have been around for a long time, and are increasing at an unprecedented rate. According to the VeriSign Distributed Denial of Service Trends Report, in fourth quarter of 2015, there was an 85% increase in DDoS attacks compared to 2014. Not only are they increasing in quantity, they are also becoming …

Continue reading

When machines do the hacking

When it comes to cybersecurity, there’s only one thing worse than hackers: robot hackers. No, we’re not talking about Skynet – at least, not yet. But for IT managers, the next wave of cybersecurity threats is likely to be automated, targeted, and almost humanly impossible to predict. That’s because of the technology phenomenon of machine …

Continue reading

Be Properly Prepared to Minimize the Impact of DDoS Attacks

Reports of aggressive DDoS attacks, also known as cyberattacks or overload attacks, are recurring topics in the news. These attacks shake up businesses and organizations—and their customers who are impacted in the end. Some people say that you can avoid DDoS attacks. That is not true. But, you can be prepared for them to minimize …

Continue reading

WikiLeaks’ website was taken offline with a DDoS attack amid an ongoing hacker feud.

As a long-time feud between rival hacking groups boiled over, the WikiLeaks website was caught in the crossfire and brought offline by a distributed-denial-of-service (DDoS) attack on 5 June. However, rather than react with anger, leaked chat logs show how WikiLeaks’ Twitter account engaged the group responsible, called OurMine, and even offered hacking tips for …

Continue reading

Ransom driven DDoS attacks gaining popularity

Out of 100 IT security professionals attending the Infosecurity Europe conference in London, 80 believe their organisation will be a target of a DDoS attack within the next 12 months, new reports said. The report was published by Corero Networks Security. Besides ransomware, in which hackers place malicious code onto a victim’s computer, encrypting all data …

Continue reading