DDoS attack sizes grow, but experts fear targeted DDoS

Denial of Service (DoS) Attack Prevention-Detection and Analysis

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can service providers prevent DDoS attacks?

    The results of a DDoS attack can be crippling, but what are service providers doing about the threat? In this SearchSecurity.com Q&A, Ed Skoudis explains how innovative ISPs are raising the bar -- and malicious hackers are jumping right over it. 

  • Metasploit Framework 3.0 released

    Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing. 

  • Go Daddy investigates source of attack

    Domain name registrar-Web site host Go Daddy suffered a sustained distributed denial-of-service attack Sunday. The source and motive of the assault is still under investigation. 

  • Zero-day flaw found in Windows Media Player

    Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week. 

  • Research shows massive botnet growth

    Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some vendors hope to strike back by sharing resources. 

  • Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. 

  • Avoiding the scourge of DNS amplification attacks

    DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization. 

  • iTunes flaw could enable malicious code

    Apple has fixed a critical hole that attackers could exploit to launch malicious code on PCs, including corporate clients, running the popular music software. 

  • Blue Security's demise evokes mixed emotions

    In this week's Security Blog Log, there's no shortage of opinions on Blue Security's decision to fold after its antispam crusade put its customers at risk. 

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa...