POSTS TAGGED: malware
Sean Leach | Feb 28, 2013
As businesses continue to move critical operations online, distributed denial of service (DDoS) attacks are increasing in frequency, sophistication and range of targets. In a 2011 Verisign study, 63% of respondents reported experiencing at least one attack that year, while 51% reported revenue loss as a result of downtime from the attack. Those numbers are undoubtedly higher today as the size, frequency and complexity of DDoS attacks continue to grow. Mitigation against these types of attacks is challenging and generally requires layered solutions across data centers and the cloud management. The success of these attacks and their ability to damage a company’s infrastructure, revenue and reputation is indicative that many IT managers still haven’t found the right protection formula to proactively mitigate them.
A DDoS attack occurs when a “botnet” (a group of compromised computers) is used to send an overwhelming amount of "bad traffic" to an intended target, such as a company’s website. Computers can become “bots” when they're infected with a virus or other malware through a compromised website or malicious email. This usually happens completely behind the scenes with the user having no idea their PC is part of a botnet. The botnet is directed by a botnet command and control that tells all of the bots who/what/when/where and how to attack. The target of the attack usually spends so much time trying to handle the bad traffic that legitimate visitors, or customers, are crowded out and unable to get to the site. Read more
Pat Kane | Oct 30, 2012
Companies and organizations large and small have expressed increasing concern over reports of so-called "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering.
The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim’s domain name – often for a significant period of time. During that time, hijackers can defraud a victim’s customers, use a hijacked domain name as a launch point for malware, or just soil a victim’s hard-earned reputation and brand awareness.
While the danger of domain name hijacking is significant, it is a threat that can be significantly reduced with proper planning and mitigation techniques.
Blog Moderator | Oct 16, 2012
Keeping the Internet available and secure is at the heart of what Verisign does. As part of our participation in National Cyber Security Awareness Month, we developed an infographic that highlights and explains some of the growing cyber threat trends prevalent in the Internet security landscape today. Follow through below the jump to take a look. Read more
Sean Leach | Oct 06, 2012
As a website owner, the last thing you want is for your site to be used to compromise your visitors' computers and mobile devices, but unfortunately, it happens all the time.
There are more than 3,500 new pieces of malware that infect more than 30,000 websites every day. Enterprises spend thousands of dollars per year on cybersecurity and web monitoring solutions to help make sure that their web sites are up and fast, but often have no monitoring in place for Web malware. The reality is that serving Web malware is far worse for your brand reputation than your site being down because it actually causes harm to your most beloved asset - your customer base. Read more
Rick Howard | Feb 28, 2012
Here’s a new video of me discussing my thoughts on the Zeus malcode, one of the most interesting manifestations in cybersecurity...Read more