• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Uncategorized

DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game

February 2, 2018 By TheNewsTeam

In late 2016, a Turkish hacker attempted to encourage DDoS attacks by turning it into a game, offering points and prizes for hackers who attempted to shut down certain political websites. The hacker set up a platform, which translates to ‘Surface … [Read more...] about DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game

DDoS Mitigation Strategy: 5 Essentials

February 2, 2018 By TheNewsTeam

One of the tips often given to security experts for mitigating DDoS attacks is to themselves think like a crook. Imagine playing the DDoS game yourself, looking for the secret passage to break through, working out what the vulnerability where you can … [Read more...] about DDoS Mitigation Strategy: 5 Essentials

Five Ways in Which Individuals Can Protect Themselves Against DDoS

February 2, 2018 By TheNewsTeam

It is not only up to the big companies to help prevent DDoS attacks, every individual can take simple actions to make our devices less susceptible to being taken over by a botnet. DDoS attacks rely upon a network of infected devices to create the … [Read more...] about Five Ways in Which Individuals Can Protect Themselves Against DDoS

What is a DNS Flood?

December 23, 2017 By TheNewsTeam

A DNS Flood is a type of DDoS attack in which DNS is employed as a variant of a UDP Flood. Spoofed DNS request packets are sent at a high packet rate and from a large volume of source IP addresses. The victim’s DNS servers believe that these are … [Read more...] about What is a DNS Flood?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.