Cyberattack

Cyberattack / Industry Updates

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

New research by Nominum, leading DNS and Internet Activity applications provider for Communication Service Providers, today reveals evidence that DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide. more»

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. more»

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

At Verisign, we focus on protecting companies from increasingly complex cyber threats, and this relationship should only raise the bar higher, as it will provide a different, more integrated approach than what's used today, to help ensure faster and more efficient detection and mitigation. more»

Why Managed DNS Means Secure DNS

The current DNS protocol, "if my packets don't get through I'll just retransmit them and they're not critical" will no longer cut it in today's ever-changing security landscape. more»

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, it also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organizations use. more»

Hope is Not a Strategy: Neustar Releases 2012 Annual DDoS Attack and Impact Survey

The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small. more»

How Neustar Technology Can Help Mitigate DDoS Attacks

Learn about the diverse technologies Neustar uses to Mitigate DDoS attacks quickly and effectively. The seasoned DDoS fighters in the Neustar Security Operations Center explain the need for a full toolset to combat complex attacks. more»

Reducing the Risks of BYOD with Nominum's Security Solution

In previous posts, Pat Barnes has discussed the risks associated with BYOD, and a DNS-based approach for reducing those risks. Essentially this approach consisted of making use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more»

Nominum Releases New Security Intelligence Application

The Security Intelligence application provides comprehensive threat visibility by using continuously updated data to provide up-to-the-minute in-network protection and reporting for an organization's network and customers against the latest Internet threats. more»

Recent Trends and Options to Mitigate DDoS Attacks (Webcast)

This Monday, December 3, Neustar will hold a webcast to review recent trends in attacks and the most popular methods of mitigation. During the 60 minute webcast, recent attacks will be analyzed as well as implications they have had on DDoS mitigation solutions. more»