Could IPv6 Result in More DDoS Attacks?

With the growing popularity of IPv6 (Internet Protocol Version 6), so the possibility of this protocol providing a gateway for Distributed Denial of Service (DDoS) attacks has also increased. Developed by the Internet Engineering Task Force (IETF) to replace the forthcoming exhaustion of IPv4, IPv6 became a Draft Standard in December 1998, and was defined…

Read More

Cyber Risks of Online Gaming

As computer gaming companies rush to get their latest products onto the market, this haste may be providing a serious cybersecurity vulnerability. Prior to launching the next great computer game hit, online gaming companies have a choice—release their games on all platforms simultaneously, or release them in dribs and drabs as the development work is…

Read More

Can You Keep Up with Game-Changing DDoS Attacks? Q&A from Allot’s Webinar

In our recent webinar, I discussed with Maya Canetti, Allot’s Director of Product Management, how intensified DDoS attacks against service providers have become highly destructive. We considered the newest threats, why traditional security solutions can’t cope with the rapidly changing nature of these threats, and what can be done to best protect networks. Note: If…

Read More

Danger: VPNFilter Malware:

  Danger: VPNFilter Malware: What is it and how is network-based security best placed to thwart it? What’s this latest threat? A new malware threat has emerged that poses such a serious potential threat to data security that the FBI has advised all router users to reboot their devices. The malware, called VPNFilter, can spy…

Read More

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

Read More