Tips & advice


3182 articles

Digital Security

New DDoS attack method breaks record again, adds extortion

New DDoS attack method breaks record again, adds extortion

Digital Security

New DDoS attack method breaks record again, adds extortion

DDoS mitigation service Arbor Networks has announced that an undisclosed US company has suffered an attack fueled by internet-facing Memcached servers that clocked in at 1.7 terabits per second (Tbps), beating the previous record of 1.35 Tbps.

Tomáš Foltýn08 Mar 2018


Ransomware

Trends 2018: The ransomware revolution

Trends 2018: The ransomware revolution

Ransomware

Trends 2018: The ransomware revolution

Tracing the evolution and subsequent revolution of ransomware

David Harley07 Mar 2018


Internet of Things

Global police test their cyber-chops in simulated IoT attack

Global police test their cyber-chops in simulated IoT attack

Internet of Things

Global police test their cyber-chops in simulated IoT attack

More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.

Tomáš Foltýn05 Mar 2018


Digital Security

GitHub knocked briefly offline by biggest DDoS attack ever

GitHub knocked briefly offline by biggest DDoS attack ever

Digital Security

GitHub knocked briefly offline by biggest DDoS attack ever

At its peak, inbound traffic reached a staggering 1.35 terabits per second (Tbps), outflanking the previously record-setting assault of 1 Tbps at French web hosting provider OVH in September 2016.

Tomáš Foltýn02 Mar 2018


Digital Security

The rise of AI needs to be controlled, report warns

The rise of AI needs to be controlled, report warns

Digital Security

The rise of AI needs to be controlled, report warns

The experts urge policy-makers to work closely with technical researchers, computer scientists and the cybersecurity community to investigate, understand and prepare for possible malicious uses of AI.

Tomáš Foltýn02 Mar 2018


How To, Internet of Things

How to start analyzing the security of your IoT devices

How to start analyzing the security of your IoT devices

How To, Internet of Things

How to start analyzing the security of your IoT devices

The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.

Cecilia Pastorino02 Mar 2018


Digital Security

Major reform of cybersecurity policies in France

Major reform of cybersecurity policies in France

Digital Security

Major reform of cybersecurity policies in France

This document, which is described by its authors as a “real white paper on cyber-defense”, is divided into three parts, followed by approximately 20 priority recommendations summarizing the central elements of the document.

Gabrielle Ladouceur Despins01 Mar 2018


Privacy

Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

Privacy

Researchers unveil Veil to make ‘private browsing more private’

The blinding server randomly adds some nonsense code to every webpage. This ‘code obfuscation’, according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

Tomáš Foltýn28 Feb 2018


Cybercrime

SEC says insider trading is not the right response to cyber risk

SEC says insider trading is not the right response to cyber risk

Cybercrime

SEC says insider trading is not the right response to cyber risk

The SEC has warned public companies that they not only need to do more to fulfil their obligations to transparency and openness with investors about cybersecurity breaches, but they also must disclose other infosecurity risks.

Graham Cluley27 Feb 2018