DDoS attacks against financial firms have continued to grow in size and frequency. The specific tactics and sophistication of the attacks have evolved rapidly. Outages have prevented customers and prospects from opening new accounts, viewing account and billing information, conducting online transactions and accessing...
For many years, conventional wisdom focused solely on a perimeter-based defense with the mission to keep out all attackers. Now, it's become pertinent to see these persistent threats and attacks through a different lens - expect a successful attack and penetration of your defenses and design a defense-in-depth...
Distributed-denial-of-service attacks pose a persistent, genuine threat to all sectors. That's why we've created the DDoS Resource Center to fill the information gaps.
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
In defending against distributed-denial-of-service attacks, enterprises must comprehend the motives of the cyber-assailant, Booz Allen Hamilton's Sedar Labarre says. He outlines how organizations should assess their risks.
Distributed denial of service (DDoS) malware and tools threaten an organization's Internet-facing systems. This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities and the network indicators they generate while performing the attack methods. It includes new attack vectors...
From the growth of mobile malware to the refinement of sophisticated banking Trojans and the proliferation of point-of-sale and retail breaches, the fraud landscape continues to evolve for banking institutions globally.
But so, too, do the anti-fraud technology solutions institutions use to detect, prevent and...
On average, 86 percent of web applications have at least one serious vulnerability, and each app is attacked about 4,000 times per year, says Imperva's Terry Ray. So, how must security be improved?
Hacktivists' OpUSA distributed-denial-of-service attack against U.S. government and banking websites proved to be unsuccessful, experts say. But why was this attack a failure?
Mark Weatherford, who recently stepped down as DHS deputy undersecretary for cybersecurity, says that although planned OpUSA DDoS attacks may initially be a nuisance, they represent a genuine long-term threat to the government.
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
In assessing the risk of a distributed-denial-of service attack, organizations must think beyond shoring up systems' perimeters and concentrate on analyzing cyberthreat intelligence, Booz Allen Hamilton's Sedar Labarre says.
Anonymous says its OpUSA attack planned for May 7 aims to 'wipe' government and banking websites from the Internet. Security experts say the threat is real, but are U.S. organizations taking it seriously?
Hacktivists' phase 3 DDoS attacks against U.S. financial services firms have entered their eighth week, and FS-ISAC spokesman Greg Garcia says concerns are mounting that a criminal element to the attacks could emerge.
Distributed-denial-of-service attacks are increasing against European banking institutions. But UK consultant Mark Child says if banks are worried about DDoS, then they have bigger security problems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.