Author: Arbor Networks

How DDoS Disrupted Elections In Czechia

As DDoS attacks grow in frequency and bandwidth each year, detection and proactivity become crucial to maintaining system functionality on both back-end structures and front-end user interfaces. In the case of political elections, keeping polling up and running can mean the difference between fair democratic processes and skewed election results. In today’s shall we say ‘tempestuous’ international climate, clarity in how we choose our world leaders is paramount. Unfortunately, cyberattacks that impede this goal are only too common.

Read more

Today’s Predictions for Tomorrow’s Internet: Using IoT Devices to Launch Attacks from Within

By Steinthor Bjarnason

The number of IP-enabled IoT devices has increased dramatically in the last several years and according to IHS, it is predicted to reach the staggering number of 30.7 billion devices by 2020. Almost every device manufactured today, including home appliances, street lights, parking meters, toys and even automobiles include some sort of IoT functionally which allows them to be monitored and/or managed via the internet.

Read more

Arbor Presenting at Upcoming Security Events

Arbor Networks will be presenting at two security industry events in June: ISMG’s Fraud & Breach Prevention Summit in Chicago and the IANS Information Security Forum in Dallas. The ISMG session will focus on the impact of new cyber regulations and the IANS talk will focus on the challenges facing security teams related to big data, the lack of context and actionable intelligence.

Read more

In an Internet minute

  Sources:  50,200 mobile apps downloaded a minute: http://dazeinfo.com/2015/01/16/internet-30-seconds-2014-50k-apps-downloads-136-million-emails/, 2014 94 Twitter accounts created a minute: http://www.statisticbrain.com/twitter-statistics/, 2015 2.4 million Google searches a minute: http://www.internetlivestats.com/google-search-statistics/ 1389 Uber rides a minute: http://www.fastcompany.com/3050784/elasticity/uber-is-even-bigger-than-you-realize, 8, 2015 30 Identity Thefts a minute: http://www.foxbusiness.com/features/2014/02/05/someone-became-identity-theft-victim-every-2-seconds-last-year.html, Feb. 5, 2014 2,083,333 minutes used on Skype calls every minute: http://blogs.skype.com/2015/12/17/2015-skypes-year-in-review/, […]

Read more

Neverquest: a global malware campaign takes root

Last week, the ASERT team published an in-depth analysis of a global malware campaign. Neverquest is a sophisticated global threat targeting the world’s financial institutions by going after their customers – you and me. Neverquest can detect consumer connections to hundreds of financial institutions in over 25 countries. When an infected customer connects to their bank or other recognized site, Neverquest inserts itself into the process allowing it to modify web pages and steal credentials that can be used to perform fraudulent transactions. And it’s not just banks. Neverquest is designed to capture data based on key words like “Account Balance” or posts to other sites like your favorite shopping, email or social media platforms. Neverquest is sophisticated malware that is easily extensible, supports different campaigns,  designed to avoid detection, and shows no signs of slowing down.

Read more