• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

TheNewsTeam

DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game

February 2, 2018 By TheNewsTeam

In late 2016, a Turkish hacker attempted to encourage DDoS attacks by turning it into a game, offering points and prizes for hackers who attempted to shut down certain political websites. The hacker set up a platform, which translates to ‘Surface … [Read more...] about DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game

DDoS Mitigation Strategy: 5 Essentials

February 2, 2018 By TheNewsTeam

One of the tips often given to security experts for mitigating DDoS attacks is to themselves think like a crook. Imagine playing the DDoS game yourself, looking for the secret passage to break through, working out what the vulnerability where you can … [Read more...] about DDoS Mitigation Strategy: 5 Essentials

Five Ways in Which Individuals Can Protect Themselves Against DDoS

February 2, 2018 By TheNewsTeam

It is not only up to the big companies to help prevent DDoS attacks, every individual can take simple actions to make our devices less susceptible to being taken over by a botnet. DDoS attacks rely upon a network of infected devices to create the … [Read more...] about Five Ways in Which Individuals Can Protect Themselves Against DDoS

DDoS Case Study: Phil Nagy and the Winning Poker Network

February 2, 2018 By TheNewsTeam

Just As Phil Nagy, the founder of the Winning Poker Network and American Cardroom, was holding a big tournament last summer, his network was struck by a powerful denial-of-service attack, which forced Nagy into postponing or scrapping various events. … [Read more...] about DDoS Case Study: Phil Nagy and the Winning Poker Network

The Men Behind Mirai

February 2, 2018 By TheNewsTeam

Last month, three men pleaded guilty to creating the Mirai botnet, in which hundreds of thousands of connected digital video records, routers and cameras were used to launch a massive DDoS attack against the domain name services company, Dyn for an … [Read more...] about The Men Behind Mirai

DDoS Mitigation in the Cloud: Part II

January 25, 2018 By TheNewsTeam

There are five general requirements to remove an attack in the cloud: (i) Detect the attack asap and determine its size; (ii) Attempt to mitigate its effects as much as is possible; (iii) Migrate the Virtual Machine (VM), which is under attack to … [Read more...] about DDoS Mitigation in the Cloud: Part II

DDoS Mitigation in the Cloud: Part I

January 25, 2018 By TheNewsTeam

DDoS mitigation in the cloud presents a new dimension to solutions offered in traditional computing environments. By its very nature, cloud computing is vulnerable to DoS and DDoS attacks, however, it also offers many opportunities to recover quickly … [Read more...] about DDoS Mitigation in the Cloud: Part I

Mitigating Against XML and HTTP-DoS and DDoS Attacks

January 25, 2018 By TheNewsTeam

There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks

XML-DoS and HTTP-DoS Attacks in the Cloud

January 25, 2018 By TheNewsTeam

XML and HTTP DoS or DDoS attacks both aim to exhaust server resources. EXtensible Markup Language (XML) and HyperText Transfer Protocol (HTTP) are both used extensively in cloud computing web services. Not very much work has been done to ensure … [Read more...] about XML-DoS and HTTP-DoS Attacks in the Cloud

DDoS Attacks in Cloud Computing

January 25, 2018 By TheNewsTeam

Cloud computing allows on-demand access to a shared pool of resources, including networks, servers, storage and services. DoS and DDoS attacks are serious threats to the availability of services offered on the cloud because of the various new … [Read more...] about DDoS Attacks in Cloud Computing

Shopper Holiday DDoS Attacks

January 18, 2018 By TheNewsTeam

Shopper holiday DDoS attacks are nothing new. Back in 2009, a DDoS attack on a major DNS provider took some of the web’s biggest online stores offline. The websites for Amazon and Wal-Mart were both taken down for an hour at the peak of the … [Read more...] about Shopper Holiday DDoS Attacks

Gamer Holiday DDoS Attacks

January 18, 2018 By TheNewsTeam

Gamer holiday DDoS attacks are not a new phenomenon. The end of year holiday period has become a time for increased DDoS attacks, particularly those targeted at gamers. The holidays usually see growth spurts in the number of gamers online, keen to … [Read more...] about Gamer Holiday DDoS Attacks

Player Advantage DDoS Attacks: the Beginnings of DDoS

January 18, 2018 By TheNewsTeam

Player advantage DDoS attacks fall into a similar attack motivation bracket as business rivalry motivated attacks. We wrote elsewhere about this. Taking down or slowing the service of a rival competitor can significantly affect their bottom line, … [Read more...] about Player Advantage DDoS Attacks: the Beginnings of DDoS

What is Second-Hand DDoS?

January 18, 2018 By TheNewsTeam

As enterprises increasingly depend on hosted infrastructure and services, they are placing themselves at greater risk of second-hand DDoS attacks. The size and scale of hosting or datacentre operator network infrastructures and their huge customer … [Read more...] about What is Second-Hand DDoS?

Smokescreen DDoS Attacks

January 18, 2018 By TheNewsTeam

DDoS attacks are employed as a smokescreen for other more malicious cyberattacks more often than you might think. The swarming nature of DDoS can be an effective distraction technique; as cybersecurity teams focus on mitigating the attack and getting … [Read more...] about Smokescreen DDoS Attacks

« Previous Page
Next Page »

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.