Do you know that Pentagon has announced that it is working to fund researchers and tools that help the organizations battle against the threat of the most common form of cyber-attack i.e. the distributed denial-of-service attacks (DDoS)? BGR says that Pentagon is looking to fund the researchers who can help the organizations recover from a distributed denial of service attack in maximum 10 seconds. Visit our guide to know more about the basics of how DDoS attacks work.
This program called Extreme DDoS Defense is something that is being inspired by the increasing number of DDoS attacks in recent times. DDoS attacks have become a greater threat in the second quarter of 2015, according to the latest State of the Internet report from Akamai.
Compared to this time last year, DDoS attacks have grown at an unprecedented pace of 132 percent. This increase is seven percent since the last quarter and the world has also seen 12 mega attacks that peaked at more than 1,000 Gbps and 50 million packets per second.
According the report, Mega attacks have become more common and very few organizations have the technology to defend themselves against such attacks. The largest DDoS attack was recorded last quarter that lasted for more than 13 hours and peaked at 240 Gbps.
To carry out such attacks, the unsecured home devices that connect using the Universal Plug and Play (UPnP) Protocol are largely used as SSPD reflectors. Also, the world’s most popular blogging platform and content management system, WordPress is a regular and attractive target for attackers and they exploit the vulnerabilities in the third party plugins and themes.
“The threat posed by distributed denial of service (DDoS) and web application attacks continues to grow each quarter,” said John Summers, vice president of Akamai’s cloud security business unit. “Malicious actors are continually changing the game by switching tactics, seeking out new vulnerabilities and even bringing back old techniques that were considered outdated.”
According to Akamai’s, DDoS attacks have become the most commonly used method by the attackers to target an organization’s security, and cyber-criminals are deploying new tactics by seeking out new vulnerabilities.
“Hunted” schoolgirls’ nude images and personal info published online
More than 2,000 sexual images of underage girls and women have been shared by teen boys and young men, on an...August 17, 2016
Why you STILL can’t trust password strength meters
I’m worried about password strength meters. In March 2015 I tested five popular password strength meters in a simple experiment that...August 17, 2016
Facebook’s unblockable-ads push is a “big bluff”
Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just...August 17, 2016
Did “The Shadow Brokers” hack NSA cyberweapons worth $500M?
A self-styled hacking group going by The Shadow Brokers have started a tongue-in-cheek media campaign claiming that they’ve penetrated the NSA...August 16, 2016
US hotels hit by payment card slurping malware
The chain that owns Westin, Starwood, Marriott, Hyatt, Intercontinental and Le M?ridien hotels – HEI Hotels & Resorts – on Friday...August 16, 2016
People like using passwords way more than biometrics
A new survey shows that we’ll give up our passwords only when they’re pried from our cold, dead hands. That’s more...August 16, 2016
“You dirty RAT” – Spy versus Spy in the cybercrime underworld
Thanks to Gabor Szapannos of SophosLabs, who did the hard work behind this article. Not all malware is ransomware, even though...August 16, 2016
Silk Road suspect “Libertas” can be extradited to US, says court
Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct...August 15, 2016
Tech support scammer tricked into installing ransomware
First things first, we do not recommend that you screw around with crooks. That includes fake support calls, 419 scammers and...August 15, 2016