As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?” Traditional techniques of defense include SYN-cookies, SYN-proxy, redirects, challenges, and of course the black hole routing technique to name a few.
One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers).
Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks.
Distributed denial of service (DDoS) attacks have in the past been viewed mostly as a tool of online protest due to Anonymous' obvious predilection for this service disruption technique, but have long stopped being just that.
A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.