Two months ago, we updated the Imperva Incapsula SLA (service level agreement) to guarantee network and application layer DDoS attack mitigation in under 10 seconds. This commitment sets a new standard for time to mitigation
Mobile devices are easy inroads for cyber criminals. Everyone uses them, they are moderately secured and outdated devices may not have the latest security patches. Sometimes, if a device is part of a botnet the
A case study of 470 Gbps distributed denial of service (DDoS) attack—the largest assault in our records to date.
There’s been a lot of heated discussion in the Tor community about cloud security services blocking access to Tor users. In an effort to block Tor, some heavy-handed decisions have adversely affected a lot of
Valentine’s Day is the busiest day of the year for florists, followed by Mother’s Day, Easter, and Christmas. Industry experts estimate that consumers will spend close to $20 billion during this year’s Valentine’s Day. What we’re seeing
On Sunday, February 7, when Super Bowl 50 was on, Internet traffic dipped significantly in several countries as people turned on their TVs to watch the game. However, in anticipation of Super Bowl 50, traffic
A bot , also known as Internet bot, is a program that runs automated tasks over the Internet. Typically intended to perform simple and repetitive tasks, Internet bots are scripts and programs that enables their
Much has been said about the threat posed by the Internet of Things (IoT). Considered the “barbaric horde” of under-protected connected devices, all of them are just waiting to be compromised by any half-competent hacker.
Small Office / Home Office (SOHO) router security has recently become a hot topic. For those who are unfamiliar with the situation, it can best be described as negligent, with ISPs, vendors, and users sharing
Our Most Read Posts
Sorry. No data so far.