How to stop DDoS spoofing attacks

Denial of Service (DoS) Attack Prevention-Detection and Analysis

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Research shows massive botnet growth

    Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some vendors hope to strike back by sharing resources. 

  • Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. 

  • Avoiding the scourge of DNS amplification attacks

    DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization. 

  • iTunes flaw could enable malicious code

    Apple has fixed a critical hole that attackers could exploit to launch malicious code on PCs, including corporate clients, running the popular music software. 

  • Blue Security's demise evokes mixed emotions

    In this week's Security Blog Log, there's no shortage of opinions on Blue Security's decision to fold after its antispam crusade put its customers at risk. 

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa... 

  • Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office found a creative way to ensure that no one inside or outside could tap into the state network wirelessly. 

  • The key technologies in a network perimeter intrusion defense strategy

    This article lays the groundwork for future discussions of intrusion defense. Joel Snyder introduces technologies that act as strong network perimeter defenses. 

  • Achieving network security with tomorrow's antivirus tools

    Learn about antivirus from an intelligence/technology perspective and offers best practices for simple file-type blocking, and the implementation of heuristic- and reputation-based antivirus tools. 

  • Grid computing and security uncertainties

    Sun Microsystems made a splash last week by announcing the first generally available commercial grid computing service. However, it was quickly brought to its knees by a DDOS attack; it proved to be minor, but nonetheless turned the spotlight on the ...