The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks for service providers, and how can you stay ahead of the game to keep yourself and your customers safe? Hackers Back in the Spotlight Cybersecurity Ventures   predicted that “global spending…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

ISPs Must Take the Wheel when Driving The IoT in Their Networks

From connected vehicles and vending machines to smart meters and wearables. The Internet of (connected) things (IoT) is promising to change our daily life as we know it, making it easier, better and more efficient. The recent massive Distributed Denial of Service (DDoS) attack, however, disrupted some of the most popular Internet services like Twitter and AirBnB. Carried out using an army of IoT botnets, the attack raised alarm bells with service providers. It proved that besides the smart and cool experiences IoT devices can deliver, there is a big security risk that cannot be overlooked.