Neustar Engineering’s Posts
Just Enough Is Good Enough: The Profile of Multi-vector Attacks
During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post profiles multi-vector attacks, a troubling trend on the rise.
Opportunists in the Woodwork: Security Exploits on the Internet of Things
It is estimated that there will be some 212 billion IoT devices by the year 2020. The unfortunate reality is that with every great technological shift, there will be new avenues for abuse, theft, and mischief. In fact, there are new exploits that are already impacting the Internet of Things and shaping the strategies of cyber attacks against it.
Ten Cyber Threats Outside the Firewall
When most people think of cyber security, they think about passwords, firewalls, and hackers. But security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization’s bottom line, brand, and reputation—all of which exist outside of a company’s firewall.
How to Weather a DDoS Storm
Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan.
Press X to DDoS (part 2)
DDoS is more than a nuisance for the provider of the gaming platform. The entire business hangs in the balance. DDoS can make the platform unavailable to all users. Revenue, user experience and brand reputation are all at stake. This is second in a two-part series on DDoS attacks on the gaming industry. This blog post will discuss how gaming platforms and gamers can protect themselves from DDoS attacks.
Press X to DDoS (part 1)
Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole.