Cloudbric provides comprehensive web security Today, we will continue our discussion based on the Types of Attacks – DDoS Part 1. This will be a more in-depth look at how DDoS attacks are carried out. Let’s get started! Ping Flood Attacks This is a type of DDoS attack where an attacker focuses on ping flooding the ICMP packets of a victim’s network. This is more successful carried out if the attacker’s bandwidth is greater than the
Web Attacks & Trends  
Hackers can take over the world OK, so we now live in a world where even a 7-year-old can break into a public network and essentially hack a website. Hacking can be that easily and the information on how to do it properly is so widespread. Now is not the time to just overlook the issue and brush it off. Your precious information is leaking somewhere on the internet and you might not even know it.
Web Attacks & Trends   ,
Login credentials for computers In this second part of “How Safe Is Your Website?”, we wanted to add one more attack variation that we think you should know about. The really popular way for hackers to access your website is through an attack called an SQL Injection. Here is a short post about SQL Injections and why they can be dangerous. What is an SQL Injection? SQL Injections are a tricky situation. SQL Injections involves the
Web Security Tips   ,
When it comes to web security, people really have no idea how vulnerable their websites can be. The majority of people aimlessly browse and post private information to share with friends and coworkers. One thing you need to keep in mind is that once it’s up on the online space, then it can and will be accessed by unauthorized viewers. Posting updates to your social networks can seem harmless, but it can actually lead to
Web Security Tips   , ,
Cybersecurity is the hottest topic of the month. With the latest hacking news surrounding Sony, all the attention has been placed upon North Korean hackers and cyber-attacks! With Obama declaring this incident as an act of terrorism to the chaos over the opening of The Interview, it’s time to take this matter into our hands and learn about web security! Various Tiers Today, we are going to talk about how servers can be organized in various
Web Security Tips   ,
Walking down a street in Seoul Earlier in the week, we discussed the various types of web threats that exist for computer systems. In this post, we’ll discuss the common trends of hacking in South Korea – a prominent IT nation – and beyond. Among attacks against web applications, the most common are SQL injections and Cross-Site-Scripting (XSS). These attacks have a goal of web page defacement, data collection and a search for other weaknesses in the
Editorial   ,

November 19, 2014

Cloudbric 101

So, you finally decided that your website is worth protecting (and it is!) and are considering Cloudbric. Are you still confused about how web protection works? Unsure of what the Cloudbric sign up process looks like? Well, don’t be afraid! Let’s Get Started with Cloudbric! We know that taking the plunge to implement a cyber security service might seem overwhelming. Well, we’re going to show you how easy it is to sign up for our services
Cloudbric Tips & Tricks   , ,

November 17, 2014

Types of Web Threats

The internet is a digital jungle; there is a wide range of dangers waiting for you out there. In this brief article, Cloudbric will introduce you to some common web attacks that make you wish you had web protection beforehand. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Denial of Service (DoS) attacks have grown more and more sophisticated as the world wide web becomes more diverse. The primary objective of a DoS
Web Security Tips   , ,
Banking on the internet can be risky Many offline services fully transitioned to adopting an online presence as web use has grown exponentially. In today’s society, major services such as financial transactions and official certificate issuances now occur through the internet. The web is no longer a place of convenience, but rather an inseparable part of our lives. The two key representative services occurring through the internet are search and financial services. The most common functions
Editorial   , , ,
DNS servers help connect users to websites Everyone who’s used the internet has come across with the term “DNS” in some point of their online life, but more likely than not ignored it, thinking it was just one of those internet gibberish lingos. Frankly, many people guilty of doing this. But what not people know are aware of is the importance of a Domain Name Server. In this article, you will learn about what DNS
Web Security Tips   , ,