Keeping the Wolves at Bay: Strategies to Protect Against the New DDoS

By: Rishi Agarwal, Chief Evangelist, NSFOCUS

What do connected cars, smart appliances and self-adjusting thermostats have in common? They are part of the rapidly growing Internet of Things (IoT). Far more than the latest catchphrase or short-lived tech trend, IoT is a real phenomenon that is here to stay, offering greater convenience to consumers and untold opportunities for businesses.Read More »

Why Hosting Services Should Prepare for DDoS Attacks

By: Rishi Agarwal, Chief Evangelist, NSFOCUS

Hacktivists, competitors, disgruntled players, or former employees or nation-states with an agenda – these are the actors behind the scenes of the ever-increasing number of data breaches and DDoS attacks. They happen to organizations of all sizes across all industries, but gaming sites and their hosting providers tend to get hit the hardest. In fact, according to recent research, in 2H2014 DDoS attacks targeting online gaming are the fastest growing kind of attacks. Why is that the case, and what can hosting providers do to defend themselves?Read More »

Tracking and Analysis of the Anonymous Operation Against China

Attack and Defense

On the night of May 28, 2015, according to information obtained by NSFOCUS, Anonymous was intending to launch an operation against China (OpChina) on May 30, which was suspected to be a reaction to the recent international situation. This news, once disclosed, drew wide attention from all people concerned. Based on its knowledge of attacks launched by this hacker organization against China and years of experience in coping with such attacks, NSFOCUS Threat Response Center (TRC) made corresponding preparations, well poised for a fight against the imminent attack. This article provides an in-depth analysis of this attack and presents a targeted solution.
Read More »

Simple Service Discovery Protocol Adds to IoT Complexity

By Balaji Narasimhan, 29-May-2015

Much has been written about how secure–insecure, rather–IoT is. As with all forms of technology, security takes the back seat because people often concentrate on other features.

Much has been written about how secure–insecure, rather–IoT is. As with all forms of technology, security takes the back seat because people often concentrate on other features.Read More »