Email Alerts
-
GoDaddy investigates service disruption
GoDaddy said it was working to restore service. A person claiming to be a member of Anonymous has claimed responsibility. News
-
DDoS mitigation a key component in network security
With DDoS attacks increasing in frequency, size and complexity, it’s time for online businesses to start protecting themselves. News
-
Arbor Networks warns of IP-Killer, MP-DDoser DDoS tool
Arbor Networks researchers found robust capabilities in the MP-DDoser/IP-Killer tool used to conduct powerful distributed denial-of-service attacks. News
-
DoS attack responses demand better business continuity plans
Expert Nick Lewis says an effective DoS attack responses demand better business continuity plans, including pre-negotiating with providers. Tip
-
Is it possible to prevent DDoS attacks?
A distributed denial-of-service (DDoS) attack can consume all your network bandwidth. Learn how to prevent a DDoS attack in this expert response. Answer
-
DDoS attacks growing in size, break attack bandwidth barrier, Arbor Networks says
Attackers are becoming more skilled at harvesting the amount of bandwidth available and selecting specific targets, a new report finds. Article
-
DDoS mitigation expert predicts more serious application-layer attacks
The WikiLeaks "hacktivist" DDoS attacks pale in sophistication to the more serious application-layer DDoS threats of the future. Article
-
China-based IMDDOS botnet offers DDoS services for hire
Researchers at Damballa Inc. have discovered one of the largest active global botnets, which can rented out to flood domains with unwanted traffic. Article
-
How to stop a DoS attack against a key server
When a disgruntled former employee decides to wreak havoc on a network with a DoS attack, there are a few quick steps you can take to minimize the damage. Learn more in this expert response. Ask the Expert
-
Frustration growing over limited ability to shut down botnets
Botnets are growing and security research teams are virtually powerless to do anything about it. Article
Security Management Strategies for the CIO