Get In Touch
December 2016 Archives
One of the biggest cyberthreats making the rounds on the internet is the Mirai botnet. Mirai targets connected Internet of Things (IoT) devices, using each infected device to launch DDoS attacks and cause website outages around the globe by flooding them with queries. Examples of recent Mirai-generated web outages are the Dyn attack which took down or significantly slowed sites like Airbnb, Twitter, the New York Times, CNN, Fox News,
Ever thought you'd be able to order Xfinity TV service from Amazon; or watch Netflix through your cable set-top box? If politics makes strange bedfellows then programming for Internet TV is like: ... last call at a college bar. ... a '70s key party. ... an episode of 90 Day Fiance. Let's just say that some unexpected relationships have been forged thanks to the disruptive forces of online video. It's
If you grew up in the 1970's and 80's, this simple statement could ruin your holiday - if Mom & Dad hadn't had the foresight to stock up on AA, AAA, C, D, and 9-volt batteries before you opened your presents, you had to put your handheld video games, animatronic animals, and talking dolls aside for a few days. In contrast, today's gadgets tend to come with a USB charging
In the first of this two-part blog, I reported the impact that the Dyn DDoS attack had on the financial services industry. Banks, insurers, credit cards, and others had two waves of impacts on Oct. 21, with many websites clocking in with 60 second page response times, and others with outright failures, not able to service their customers. In Part 2, we'll dig into some details to better understand the
Nominum, now part of Akamai, inaugural security report published by its Data Science team, Data Revelations: Fall 2016, includes an analysis of some of the largest threats that are impacting organizations and individuals, including ransomware, DDoS, mobile malware, IoT-based attacks and more. Since DNS is the launch point for over 90% of cyberattacks, it offers a great vantage point from which to examine, understand, thwart and proactively prevent threats1. With
The increasingly digital consumer lifestyle, fueled by explosive growth in the use of the internet, mobile technologies and social media, has given rise to the empowered customer. With access to more information, choices, and opportunities, consumers across all industries are in a position to demand not only what they want, but also where and how they want it.