Tag: cloudflare
-
Tendency for DDoS attacks to become less volumetric fits in a wider trend
A current trend sees DDoS attacks focusing less on large volume attacks and more on attacks that exhaust server resources, Cloudflare reports . The number of layer 7 attacks per day. Source: Cloudflare. This makes sense. The purpose of a DDoS attack is to render a service unavailable, and as increased defences have made it…
-
Tendency for DDoS attacks to become less volumetric fits in a wider trend
A current trend sees DDoS attacks focusing less on large volume attacks and more on attacks that exhaust server resources, Cloudflare reports . The number of layer 7 attacks per day. Source: Cloudflare. This makes sense. The purpose of a DDoS attack is to render a service unavailable, and as increased defences have made it…
-
WireX DDoS botnet takedown shows the best side of the security industry
It is easy to be cynical about the security industry and its tendency to make ever bigger mountains out of molehills, but behind a thin layer of marketing, there are a great many people who really care about making the world a more secure place. We have seen many examples of researchers from competitor companies…
-
WireX DDoS botnet takedown shows the best side of the security industry
It is easy to be cynical about the security industry and its tendency to make ever bigger mountains out of molehills, but behind a thin layer of marketing, there are a great many people who really care about making the world a more secure place. We have seen many examples of researchers from competitor companies…
-
VB2017 Small Talk: The encryption vs. inspection debate
We all know that security often gets in the way of convenience, but sometimes security even gets in the way of security. This is the case, for example, when a decision needs to be made on whether to break an encrypted HTTP connection in order to inspect it for malicious content. HTTPS allows for this to…
-
VB2017 Small Talk: The encryption vs. inspection debate
We all know that security often gets in the way of convenience, but sometimes security even gets in the way of security. This is the case, for example, when a decision needs to be made on whether to break an encrypted HTTP connection in order to inspect it for malicious content. HTTPS allows for this to…
-
John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017
Later this week, we’ll be announcing the programme for VB2017 , the 27th Virus Bulletin International Conference – a programme that we think is the best yet, and about which we are very excited. To give you just a sneak preview, we are thrilled to be able to announce today that the opening and closing…
-
John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017
Later this week, we’ll be announcing the programme for VB2017 , the 27th Virus Bulletin International Conference – a programme that we think is the best yet, and about which we are very excited. To give you just a sneak preview, we are thrilled to be able to announce today that the opening and closing…
-
To make Tor work better on the web, we need to be honest about it
If you regularly browse the web through the Tor network, you will have noticed that many websites are either inaccessible, or have strong barriers (in the form of difficult CAPTCHAs) put in front of them. In a blog post , ‘The Trouble with Tor’, CloudFlare CEO Matthew Prince, whose company is responsible for many of…