Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
Many security experts associate advanced persistent threats (APTs) with custom malware, specifically designed for the target of an attack. However, a host of recent attacks reveal that off-the-shelf malware is becoming a significant player in APT attacks.
This is an unnerving finding that delineates a serious new...
DDoS attacks may be out of the headlines, but they have hardly disappeared as a significant business concern.
In this new 2015 DDoS Impact & Response Study of organizations in the U.S. and UK, we find:
55% of respondents say they have experienced as many or more attacks as in the past year;
60% say the attacks...
DDoS attacks may be out of the headlines, but they have hardly disappeared as a significant business concern.
In this new 2015 DDoS Impact & Response Study of organizations in the U.S. and UK, we find:
55% of respondents say they have experienced as many or more attacks as in the past year;
60% say the attacks...
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
A "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not hacked, but rather disrupted, and that all airlines face similar risks.
Attackers today continue to refine their distributed denial-of-service attack capabilities, delivering downtime on demand. The increase in attack effectiveness and volume demands new types of defenses, says Akamai's Richard Meeus.
Whether launched to disrupt an organization or to distract a security team so that fraud can be committed elsewhere, Distributed Denial of Service (DDoS) attacks remain a powerful weapon in today's arsenal of advanced threats. For any organization with significant revenue associated to online transactions, an...
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
DDoS attacks are easy to launch yet difficult to defend against. Margee Abrams of Neustar discusses the state of DDoS and how organizations can best defend against today's potentially damaging attacks.
DDoS attackers have been targeting the popular code-sharing website GitHub. Security experts say the massive attacks appear to have originated from China and been designed to disrupt access to GitHub-hosted anti-censorship tools.
Financial services organizations are primary targets for increasingly sophisticated - and numerous - security attacks. In fact, a 2012 Ponemon Institute study revealed that 64 percent of US retail banks surveyed experienced a distributed denial of service (DDoS) attack during the previous 12 months. In September 2012...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.