Neustar Engineering

Neustar's Articles
 
 

Opportunists in the Woodwork: Security Exploits on the Internet of Things

February 17th, 2016

It is estimated that there will be some 212 billion IoT devices by the year 2020. The unfortunate reality is that with every great technological shift, there will be new avenues for abuse, theft, and mischief. In fact, there are new exploits that are already impacting the Internet of Things and shaping the strategies of cyber attacks against it. Read Full Article

 

Ten Cyber Threats Outside the Firewall

August 20th, 2015

When most people think of cyber security, they think about passwords, firewalls, and hackers. But security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization’s bottom line, brand, and reputation—all of which exist outside of a company’s firewall. Read Full Article

 

How to Weather a DDoS Storm

July 13th, 2015

Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan. Read Full Article

 

Press X to DDoS (part 2)

April 27th, 2015

DDoS is more than a nuisance for the provider of the gaming platform. The entire business hangs in the balance. DDoS can make the platform unavailable to all users. Revenue, user experience and brand reputation are all at stake. This is second in a two-part series on DDoS attacks on the gaming industry. This blog post will discuss how gaming platforms and gamers can protect themselves from DDoS attacks. Read Full Article

 

Press X to DDoS (part 1)

April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article