In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.more →
DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.
There are numerous different ways to launch a DDoS attack test;more →
In the previous article in this series, we looked at the business case for DDoS (Distributed Denial of Service) testing. If you read this last post, you will probably agree that there are a number of features of DDoS attacks and DDoS mitigation systems that make DDoS attack testing particularly important.more →
DDoS, or Distributed Denial of Service, creates a risk for businesses that conduct any transactions using public Internet services. The severity of the risk will, of course, depend on how much that business relies on its online systems for revenue. If the risk is sufficiently large, then budget is usually set aside for mitigation.more →
Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.more →
Turning to predictions concerning the technical side of DDoS attacks in 2017, there is near unanimity over the escalating threat from insecure Internet of Things (IoT) devices. As we found at the tail end of 2016, large scale DDoS attacks are being facilitated by IoT botnets running the Mirai malware system (for example, the 21st October Dyn attack).more →
What does the forthcoming year hold for Distributed Denial of Service (DDoS)?
Whilst we don’t possess a crystal ball at activereach® we do pride ourselves on keeping up with the latest thinking and, of course, we are in daily touch with our customers who are at the sharp end of this malicious form of cyberattack.more →
I have seen it so many times before. DDoS (Distributed Denial of Service) tests are being commissioned simply to fulfil a “tick-box approach” to network security. Once purchased, those concerned move on to the next project. This is fine for most IT project deployments, but when it comes to maintaining effective DDoS mitigation, it is a different matter.more →