Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks for service providers, and how can you stay ahead of the game to keep yourself and your customers safe? Hackers Back in the Spotlight Cybersecurity Ventures   predicted that “global spending…

How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, safeguarding urban security increasingly involves developing and applying cyber defense technology and the analysis of big data. And they need prevention and security technology to keep pace with a…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…