DDoS

Top 3 Crypto Mining Botnets: Smominru, DDG, and ADB.Miner

Botnets have facilitated different types of cybercrime for years – the most common use cases revolve around DDoS (Distributed Denial of Service) attacks and massive spam campaigns – but things are starting to change. A new segment of cybercrime is shifting toward a paradigm where botnets do not DDoS or spam – they mine cryptocurrencies.

​SOC-as-a-Service In The City of Sparks, To Protect ​The Protectors

This article came as the result of a discussion with Sean Martin regarding how Arctic Wolf's work with the City of Sparks impacts the police and its officers. It describes how the police officers do their job differently and how an increase in tech and cyber changes the way they view society and the way they live their lives.

OPM Breach Anniversary- How Far Have We Come?

It has been two years since we first heard about one of the largest data breaches in the history of the federal government, hitting the Office of Personnel Management (OPM) and exposing the sensitive personal information of more than 22 million current and former employees. What's happened since then?

Your Firewall Won’t Save You From The Next DDoS Attack

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” - Abraham Maslow, The Psychology of Science, 1966. But using firewalls to protect against DDoS attacks has its limitations.

The Metamorphosis of an Open Source Bot - Mirai to Persirai

The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.

The Internet of Toys. Is Barbie Spying on You?

I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?

IoT Pose A Threat To Anything And Everyone Connected

When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.

The Side Effects Of A Technology Craving Society - Part 1

We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.

What Does the Future Hold for IoT Device Manufacturers?

IoT security is certainly a challenging landscape. It was difficult enough to secure a select few smartphone operating systems like IOS and Android, but IoT is a whole new world with an unlimited number of non-standard device operating systems. Michael Lynch explores this world and the future it holds for the IoT device manufacturers.

Cybercriminals Make a Lot of Money. Because it is Too Easy

A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.

Protecting Data on IoT’s Rocky Road

Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.

Curiosity Didn’t Get the Best of Him; It Led to a Career

An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.

Good Bots, Bad Bots, and Humans. Can You Tell Who Is Who?

Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?

The Role of ISPs in Cleaning Up the Internet. It’s Time!

Spoofed Internet traffic continues to plague networks across the globe, and is often evidenced by reflection/amplification of Distributed Denial of Service (DDoS) attacks. Dave Larson explores how one best practice could change the impact this could have on business.

Buckle Up! 2017 Is Gonna Get Bumpy. 10 CyberSecurity Predictions

As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.

To Win The Cyber War We Must Explore Alternative Realities

At this point, it should seem clear we are losing the cyber war. Digital security is getting worse because of lock-in. So how is this impacting our security posture? Jamison Utter explains.

What Could The Next Ransomware Note Say? Let’s Learn from 2016

When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.

Ransomware Predictions | Past, Present, Future (Part 1)

It’s easy to make predictions. It’s harder to make predictions that actually come true. Experts Chris Inglis and Scott Scheferman share a collection of ransomware predictions which includes a set that have come true, some already made that could still come true, and a whole new set sure to knock your socks off.