Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

Hackers and Do-Gooders

What do hackers and do-gooders have in common? Well the other day when I was looking for detail on some hacking incidents, I ran across this little tidbit – Join me in Hacking Autism. I was intrigued and went to the site Hacking Autism.

What an excellent idea. Instead of hacking for fun (white-hats) or profit (black-hats) here’s developers putting their talent into helping others. Hackers as...

By Arthur Hicken, 06 September 2011, 0 comments. Categories: Hacking, Industry.

Is Encryption the Solution to Cloud Security and Privacy?

By Guest Blogger Erik Heels, Partner at Clock Tower Law Group, experts in patent law

Wikipedia defines "cloud computing" as "the logical computational resources (data, software) accessible via a computer network (through WAN or Internet etc.), rather than from a local computer.  Managing local computers is hard: there are security issues, computer lifecycle issues, accessibility issues.  Cloud computing, ideally, is easy: set it and forget it,...

By CloudSwitch, 06 September 2011, 0 comments. Categories: Big Data, Compliance, Consumer, Hacking, SaaS , Security, Storage.

SQL Injection – When Will We Learn?

Once again a major web site has been hacked using good old-fashioned SQL injection. Over the weekend Nokia’s developer forum was hacked, resulting in a Homer Simpson face being put up on their web (funny) and the loss of names, email, and other personal for many developers (not funny). This is but the latest in a now very long string of SQL injection attacks, and personally I don’t see much excuse on the part of those attacked.

It might have been possible...

By Arthur Hicken, 31 August 2011, 0 comments. Categories: Big Data, Compliance, Economy, Enterprise, Hacking, Industry, Infrastructure, Private, Security.