Press enter to see results or esc to cancel.

How traffic scrubbing can guard against DDoS attacks

Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed What was possibly the world’s biggest distributed denial of service (DDoS) attack in February 2018 was stopped in its tracks after 20 minutes because there was a DDoS protection service in place. …

Continue reading

Hacker who took down entire nation’s internet is jailed

A British hacker whose cyberattacks took the nation of Liberia offline has been jailed for almost three years. Daniel Kaye launched a series of attacks on Liberian cell phone operator Lonestar in October 2015, which became so powerful they knocked out the west African country’s internet the following year. Kaye, 30, had been hired to …

Continue reading

IoT devices now top priority for cybercriminals

Hackers utilise Thingbots to launch IoT attacks Internet of Things (IoT) devices are now cybercriminals’ top attack target and have managed to surpass web, application services and email servers according to new research from F5 Labs. The fifth volume of the security firm’s The Hunt for IoT report that thirteen Thingbots, IoT devices that have …

Continue reading

10 Masterful Steps In Combating Denial Of Service Attacks

We could define DDoS (Distributed Denial of Service) attacks as the exclusive appropriation of a resource or service with the intention of avoiding any third party access. Also included in this definition are the attacks destined to collapse a resource or system with the intention of destroying the service or resource. DoS attacks are born …

Continue reading

Justice Department seizes domains used in denial-of-service attacks

The U.S. Justice Department seized 15 internet domains associated with denial-of-service (DDoS) attacks in December. The sites offered customers DDoS attacks that targeted computers with information and prevent them from being able to access the internet. These services are referred to as “booter” or “stresser” services. According to legal documents, the services attacked victims worldwide. …

Continue reading