Staying Informed About DDoS Threats

Staying Informed About DDoS Threats

New Resource Offers Attack Insights, Mitigation Strategies

By Tracy Kitten, July 10, 2013. Follow Tracy @FraudBlogger
  • Print
  • Tweet Like LinkedIn share
Get permission to license our content for reuse in a myriad of ways.

Distributed-denial-of-service attacks have plagued U.S. banks since last September. But DDoS attacks pose a persistent, genuine threat to other sectors as well. Any organization with an online presence is at risk.

Successful DDoS attacks can take a website offline, damaging brand image and chipping away at consumer trust. But they also can do much more. In some cases, these attacks can be used to mask fraud by distracting security and IT departments while banking accounts or confidential files are simultaneously being taken over.

To provide insights on the latest DDoS threats - and effective mitigation strategies - Information Security Media Group has launched a DDoS Resource Center.

The resource center, sponsored by online security firms Akamai, Fortinet, Neustar, Radware and VeriSign, includes timely interviews, in-depth features, news stories and blogs that offer insights about emerging botnets and attack techniques from those who are analyzing and battling DDoS on the frontlines. The resource center also offers expert insights on practical steps for minimizing the impact of DDoS attacks.

By visiting the resource center, you'll get the latest information on the different types of DDoS attacks, such as DNS reflection and application layer attacks, as well as the attacks' possible links to fraud. You'll learn about DDoS protections and mitigation services, notification and response strategies, and DDoS detection measures.

Here's a sampling of the variety of content our resource center offers:

  • An interview with ex-FBI investigator Shawn Henry, who shares insights about cross-border and cross-industry collaboration that's taking place behind the scenes to strengthen DDoS and cybersecurity knowledge.
  • An analysis of a new type of DDoS strike that targeted two U.S. banks for what some say could have been a test for more attacks to come.
  • A blog about how the botnet, known as Brobot, that's been used in DDoS attacks against U.S. banks is being retooled to defeat common mitigation practices.
  • And an interview with former federal banking examiner Amy McHugh about why community banks are prime targets for DDoS strikes being waged as modes of distraction to veil account takeover attempts.

The DDoS Resource Center also provides research, white papers and webinars, including a session on new defense strategies for DDoS, which includes insights from Rodney Joffee of DDoS-mitigation provider Neustar and Mike Wyffels, senior vice president and chief technology officer of multibank holding company QCR Holdings Inc.

We invite you to provide feedback, including ideas for topics you'd like to see us tackle, by submitting comments below.

Follow Tracy Kitten on Twitter: @FraudBlogger

  • Print
  • Tweet Like LinkedIn share
Get permission to license our content for reuse in a myriad of ways.
ARTICLE Researchers Describe New Air-Gap Threat

Air-gapped networks promise security by disconnecting PCs from the Internet. But graphics cards in...

Latest Tweets and Mentions

ARTICLE Researchers Describe New Air-Gap Threat

Air-gapped networks promise security by disconnecting PCs from the Internet. But graphics cards in...

The ISMG Network