The Top Five DDoS Attacks of 2011

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for the top five DDoS attacks of 2011, as identified by Corero Network Security.

Corero Network Security (CNS: LN), a leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, named its list of 2011’s top five DDoS attacks. Corero’s findings show an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected until it is too late. Corero also found an uptick in attacks against corporations by “hacktivists” DDoS-ing sites for political and ideological motives, rather than financial gain. Attacks against Mastercard, Visa, Sony, PayPal and the CIA top Corero’s list.

“The cat-and-mouse game between IT administrators, criminals and hacktivists has intensified in 2011 as the number of application-layer DDoS attacks has exploded. Coupled with an increase in political and ideological hacktivism, companies have to be extremely diligent in identifying and combating attempts to disable their websites, steal proprietary information and to deface their Web applications, ” said Mike Paquette, chief strategy officer, Corero Network Security.

Corero’s 2011 Top 5 DDoS list includes the following high-profile attacks.

More Slideshows:


How to Make a Great Impression in Your First 90 Days Start your new job off right with these tips.

The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.

Seven Tips to Attain Purpose and Happiness in Life and WorkIt may simply be a question of "when" not "if" a range of mobile computing devices displaces the PC.

 

Related Topics : Business Intelligence Vendors, Data Quality, Data Warehousing, Key Performance Indicators, Knowledge Management

 
More Slideshows

Security72-190x128 Uncovering the Truth About Six Big Data Security Analytics Myths

When BDSA is used correctly, it is extremely beneficial to an organization. However, there are many false claims around the capabilities of BDSA. ...  More >>

DataM38-290x195 Beware the Data Collectors for They Are Us: Privacy and Big Data

In our enthusiasm for all things "Big Data," are we abetting the data collectors in something that might be bad for society's (and our own) best interest? ...  More >>

IcreonBIDashboard0x Best Practices for Choosing a Business Intelligence Dashboard

Even if your BI dashboard ends up looking professional and offers beautifully rendered graphs, it won’t mean anything unless you have the right data. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date