Recent Articles
-
Attackers Using DNS Poisoning to Hijack Website Domains, Divert Traffic
Instead of just launching distributed denial-of-service attacks, cyber-attackers have started hijacking domain names and redirecting traffic from legitimate sites to malicious ones. The hacker group Anonymous recently managed to hijack the Domain Name System record for CBS.com and redirected all traffic to another Web server that displayed an empty directory structure. It appeared as if…
-
Threat Update: Malicious QR Codes Pose Risk to iPhone, Android Devices
We’ve all seen those interesting little white barcode boxes with lots of squiggles and lines that urge us to scan them with our cell phones. Called QR codes, these shortcut codes to mobile websites and applications are an elegantly simple way to cram loads of information into users’ devices with total ease. But the same…
-
F5 Launches Firewall for Data Centers
F5 Networks has launched a data center firewall designed to protect public-facing websites from cyber-attacks while also competing with other vendors in the space on both traffic capacity and cost. According to Dean Darwin, vice president of worldwide channel sales at F5 Networks, customers are beginning to recognize that the application delivery network is a…
-
Alcatel-Lucent, Arbor Networks Partner on Cloud-Based Security Platform
Under a new Alcatel-Lucent and Arbor Networks partnership, service providers would be able to offer customers cloud-based defenses against distributed denial of service (DDoS) attacks. Arbor Networks’ Threat Management System (TMS) software has been integrated into blades installed inside Alcatel-Lucent’s 7750 router, the companies said Jan. 18. Each blade can handle 5G bps of traffic…
-
Smartphones, Tablets, Android Are Why Malware Is Going Mobile in 2012
For years, computer users’ biggest security threats were attacks against their desktop computers and applications. But cyber-criminals increasingly have been turning their sights toward mobile devices and Web applications, as they are fertile new ground for lucrative cyber-attacks. It won’t happen overnight, of course, and there will still be more than enough security flaws impacting…