Botnets have facilitated different types of cybercrime for years – the most common use cases revolve around DDoS (Distributed Denial of Service) attacks and massive spam campaigns – but things are starting to change. A new segment of cybercrime is shifting toward a paradigm where botnets do not DDoS or spam – they mine cryptocurrencies.
It has been two years since we first heard about one of the largest data breaches in the history of the federal government, hitting the Office of Personnel Management (OPM) and exposing the sensitive personal information of more than 22 million current and former employees. What's happened since then?
The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.
IoT security is certainly a challenging landscape. It was difficult enough to secure a select few smartphone operating systems like IOS and Android, but IoT is a whole new world with an unlimited number of non-standard device operating systems. Michael Lynch explores this world and the future it holds for the IoT device manufacturers.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?
When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.