Blog

Hackers – exactly who, how and why?

Alastair Horner

In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.

more →

Blog

Commercial DDoS Testing vs DDoS for Hire and Open-Source Testing

Lorna Fimia

DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.

There are numerous different ways to launch a DDoS attack test;

more →

Blog

DDoS Attack Simulation: Preparing For Large-Scale DDoS Attacks

Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.

more →

Blog

DDoS Enters the Terabit Era: A Round-up of New Year Predictions for 2017 (Part 2)

Turning to predictions concerning the technical side of DDoS attacks in 2017, there is near unanimity over the escalating threat from insecure Internet of Things (IoT) devices. As we found at the tail end of 2016, large scale DDoS attacks are being facilitated by IoT botnets running the Mirai malware system (for example, the 21st October Dyn attack).

more →

Blog

DDoS Enters the Terabit Era: A Round-up of New Year Predictions for 2017 (Part 1)

What does the forthcoming year hold for Distributed Denial of Service (DDoS)?

Whilst we don’t possess a crystal ball at activereach® we do pride ourselves on keeping up with the latest thinking and, of course, we are in daily touch with our customers who are at the sharp end of this malicious form of cyberattack.

more →

Blog

You really need to “DDoS test it”!

Mike Revell

I have seen it so many times before. DDoS (Distributed Denial of Service) tests are being commissioned simply to fulfil a “tick-box approach” to network security. Once purchased, those concerned move on to the next project. This is fine for most IT project deployments, but when it comes to maintaining effective DDoS mitigation, it is a different matter.

more →