Corero Network Security (CNS: LN), a leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, named its list of 2011’s top five DDoS attacks. Corero’s findings show an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected until it is too late. Corero also found an uptick in attacks against corporations by “hacktivists” DDoS-ing sites for political and ideological motives, rather than financial gain. Attacks against Mastercard, Visa, Sony, PayPal and the CIA top Corero’s list.
“The cat-and-mouse game between IT administrators, criminals and hacktivists has intensified in 2011 as the number of application-layer DDoS attacks has exploded. Coupled with an increase in political and ideological hacktivism, companies have to be extremely diligent in identifying and combating attempts to disable their websites, steal proprietary information and to deface their Web applications, ” said Mike Paquette, chief strategy officer, Corero Network Security.
Corero’s 2011 Top 5 DDoS list includes the following high-profile attacks.
How to Make a Great Impression in Your First 90 Days Start your new job off right with these tips.
The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.
Seven Tips to Attain Purpose and Happiness in Life and WorkIt may simply be a question of "when" not "if" a range of mobile computing devices displaces the PC.
Automated business intelligence can provide business users faster, more accurate insights into an increasingly overwhelming amount of data. ... More >>
Data-driven organizations capture and reinforce the value of their data by constantly surrounding it with context -- describing where it's from, who has access, and how it is being used. ... More >>
Data silos are established with the best of intentions – to solve a specific problem or increase control of a particular data type – but paradoxically make data harder to access and govern over time. ... More >>