In late 2016, a Turkish hacker attempted to encourage DDoS attacks by turning it into a game, offering points and prizes for hackers who attempted to shut down certain political websites. The hacker set up a platform, which translates to ‘Surface … [Read more...] about DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game
Uncategorized
DDoS Mitigation Strategy: 5 Essentials
One of the tips often given to security experts for mitigating DDoS attacks is to themselves think like a crook. Imagine playing the DDoS game yourself, looking for the secret passage to break through, working out what the vulnerability where you can … [Read more...] about DDoS Mitigation Strategy: 5 Essentials
Five Ways in Which Individuals Can Protect Themselves Against DDoS
It is not only up to the big companies to help prevent DDoS attacks, every individual can take simple actions to make our devices less susceptible to being taken over by a botnet. DDoS attacks rely upon a network of infected devices to create the … [Read more...] about Five Ways in Which Individuals Can Protect Themselves Against DDoS
What is a DNS Flood?
A DNS Flood is a type of DDoS attack in which DNS is employed as a variant of a UDP Flood. Spoofed DNS request packets are sent at a high packet rate and from a large volume of source IP addresses. The victim’s DNS servers believe that these are … [Read more...] about What is a DNS Flood?