Why Prompt Breach Notification Is Important

In a blog post last April, I wrote about a merchant that waited up to a year to notify customers that their payment card information may have been compromised in a breach. There were extenuating circumstances; the federal authorities investigating the breach Continue Reading →

Bookmark and Share

Specially Crafted Packet DoS Attacks, Here We Go Again

One of the most unique types of Denial of Service (DoS) attacks involves the usage of specially-crafted packets.  Most cybersecurity professionals are already familiar with volumetric and amplified DDoS attacks, but more recent attention has been surrounding fragmented and application-layer DDoS attacks. Continue Reading →

Bookmark and Share

A Real Story About Successful DDoS Mitigation

If you’re a cybersecurity professional, you may be all too familiar with the risks associated with DDoS attacks. Over the years, the threat landscape has had detrimental effects on organizations. Including, system downtime, brand damage, loss of customer confidence, and ultimately negatively Continue Reading →

Bookmark and Share

Considering Standards Security

The Internet Engineering Task Force (IETF) Request for Comments (RFCs) are required by RFC 2223, Instructions to RFC Authors, to have a section titled “Security Considerations” that is supposed to call out any special security implications relating to the protocol itself or Continue Reading →

Bookmark and Share

Why Do We Call It Cyber Crime If We Don’t Treat It Like a Crime?

My subdivision outside of Houston, Texas has a monthly newsletter, and one of the features is the neighborhood police patrol report. It’s mostly stuff like items being taken from unlocked cars or suspicious people or vehicles in the neighborhood. Every now and Continue Reading →

Bookmark and Share

Why Would a Cute Little Slow Loris Take Down a Web Server?

You’ve heard of the “infinite monkey theorem,” which states that if you put a hundred monkeys in a room with a bunch of keyboards they will eventually type the works of Shakespeare. Is it possible that another little primate, the incredibly cute Continue Reading →

Bookmark and Share

DDoS Attacks Hit the World Cup. The Current Score: Anonymous 1, FIFA 0

The world’s most watched sporting event, the World Cup, is now underway in Brazil. Despite an expected audience of billions over the next few weeks, not everyone is a fan. Protesters of every ilk are using the prominence of this event to Continue Reading →

Bookmark and Share

Securing the Data Center and Generating Revenue – #Winning

Corero CTO, Dave Larson, spoke recently to an audience of Hosting Providers during a (Web Hosting Industry Review) WHIR hosted webinar event.   Dave addressed the audience alongside WHIR editor, Nicole Henderson, and explained how hosting providers have a new opportunity to increase Continue Reading →

Bookmark and Share

For Sale: Practically All the Details of Your Personal Life

When documents released by Edward Snowden showed that the National Security Agency (NSA) is collecting various types of data on ordinary American citizens, a lot of people were quick to voice their opinion that this is just wrong. Many Americans don’t believe Continue Reading →

Bookmark and Share

Attack of the Month Video Blog Series: Blended DDoS Attacks

It’s no surprise that today’s hackers are getting increasingly smarter. Unfortunately, traditional defenses aren’t enough to fight against the different types of DDoS attacks, which are more sophisticated and common place. Hackers are now carrying out a combination of DDoS attacks, known as Continue Reading →

Bookmark and Share