Cyberattack

Cyberattack / Industry Updates

3 Questions to Ask Your DNS Host About DDoS

Neustar provides UltraDNS and recently dealt with an attack on our network that was massive by industry standards, impacting our customers and even our upstream providers. more

Neustar to Build Multiple Tbps DDoS Mitigation Platform

Neustar today announced that it is expanding its cloud-based mitigation platform and delivering new services to provide customers greater protection from malicious, constantly evolving DDoS (distributed denial-of-service) attacks. more

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target - including DNS providers like us. Neustar provides UltraDNS and recently dealt with an attack on our network that was massive by industry standards, impacting our customers and even our upstream providers. more

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

In the 2014 Neustar Annual DDoS Attacks and Impact Report, one team member described common DDoS mitigation scenarios. Here are some excerpts from the report. more

Tips to Address New FFIEC DDoS Requirements

Recently, the FFIEC released statements that describe steps it expects financial institutions to take to address cyberattacks and highlight resources institutions can use to help mitigate the risks posed by such attacks. more

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. more

Is Your Organization Prepared for a Cyberattack?

Infamous heavyweight boxer Mike Tyson once said "everyone has a plan until they get punched in the face." As any organization that has faced a cyber attack will tell you, it is a lot like getting punched in the face, and if you're not ready, you might get knocked out. You've likely read recent headlines of major retailers, financial institutions, and now even universities, being hit with data breaches. As some of them have learned the hard way, it's not a question of if your organization will be attacked; it's a question of when. more

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. more

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

At Verisign, we focus on protecting companies from increasingly complex cyber threats, and this relationship should only raise the bar higher, as it will provide a different, more integrated approach than what's used today, to help ensure faster and more efficient detection and mitigation. more

Why Managed DNS Means Secure DNS

The current DNS protocol, "if my packets don't get through I'll just retransmit them and they're not critical" will no longer cut it in today's ever-changing security landscape. more