As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?” Traditional techniques of defense include SYN-cookies, SYN-proxy, redirects, challenges, and of course the black hole routing technique to name a few.
One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers).
Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks.
A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr.
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.