Unhappy Man
Here are two types of attacks that are intended to monopolize your system’s resources. Reflection Attacks Reflection attacks (also known as DoS (denial of service) reflection attacks) are attacks that use the same protocol in both directions. The attacker spoofs the victim’s IP address and sends a request for information via UDP (User Datagram Protocol) to servers known to respond to that type of request. The server answers the request and sends the response to the victim’s IP address.
Web Attacks & Trends   ,
An application-layer attack targets the layer of the internet that essentially faces the end user. This layer, also known as layer 7 in the OSI (Open Systems Interconnection) model, includes applications that you are used to accessing yourself online. Traditional DDoS attacks, such as ICMP and SYN floods, as we mentioned earlier, still challenge network operators; however, the detection of these common attacks are well understood by network security experts. Even when attackers utilize IP spoofing,
Web Attacks & Trends   ,
Zombie Web Attack

February 27, 2015

Attack Agents and Bots

Zombie cartoon So, we gave you guys a pretty good overview about DDoS attacks and how they are carried out. In case you missed it, check out DDoS Part 1 and Part 2 here. One of the critical parts of a successful DDoS attack relies on bots or a botnet. Botnets are groups of zombie computers under the remote control of an attacker via a command and control server (C&C Server). These zombie computers are
Web Attacks & Trends   , ,
Cloudbric provides comprehensive web security Today, we will continue our discussion based on the Types of Attacks – DDoS Part 1. This will be a more in-depth look at how DDoS attacks are carried out. Let’s get started! Ping Flood Attacks This is a type of DDoS attack where an attacker focuses on ping flooding the ICMP packets of a victim’s network. This is more successful carried out if the attacker’s bandwidth is greater than the
Web Attacks & Trends  
Hackers can take over the world OK, so we now live in a world where even a 7-year-old can break into a public network and essentially hack a website. Hacking can be that easily and the information on how to do it properly is so widespread. Now is not the time to just overlook the issue and brush it off. Your precious information is leaking somewhere on the internet and you might not even know it.
Web Attacks & Trends   ,
Login credentials for computers In this second part of “How Safe Is Your Website?”, we wanted to add one more attack variation that we think you should know about. The really popular way for hackers to access your website is through an attack called an SQL Injection. Here is a short post about SQL Injections and why they can be dangerous. What is an SQL Injection? SQL Injections are a tricky situation. SQL Injections involves the
Web Security Tips   ,
When it comes to web security, people really have no idea how vulnerable their websites can be. The majority of people aimlessly browse and post private information to share with friends and coworkers. One thing you need to keep in mind is that once it’s up on the online space, then it can and will be accessed by unauthorized viewers. Posting updates to your social networks can seem harmless, but it can actually lead to
Web Security Tips   , ,
Cyber security is the hottest topic of the month. With the latest hacking news surrounding Sony, all the attention has been placed upon North Korean hackers and cyber attacks! With Obama declaring this incident as an act of terrorism to the chaos over the opening of The Interview, it’s time to take this matter into our hands and learn about web security! Various Tiers Today, we are going to talk about how servers can be organized
Web Security Tips   ,
Walking down a street in Seoul Earlier in the week, we discussed the various types of web threats that exist for computer systems. In this post, we’ll discuss the common trends of hacking in South Korea – a prominent IT nation – and beyond. Among attacks against web applications, the most common are SQL injections and Cross-Site-Scripting (XSS). These attacks have a goal of web page defacement, data collection and a search for other weaknesses in the
Editorial   ,

November 19, 2014

Cloudbric 101

So, you finally decided that your website is worth protecting (and it is!) and are considering Cloudbric. Are you still confused about how web protection works? Unsure of what the Cloudbric sign up process looks like? Well, don’t be afraid! Let’s Get Started with Cloudbric! We know that taking the plunge to implement a cyber security service might seem overwhelming. Well, we’re going to show you how easy it is to sign up for our services
Cloudbric Tips & Tricks   , ,