You searched for Distributed denial-of-service/ | SC Media

Your search for Distributed denial-of-service/ returned 28 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove

Your search for Distributed denial-of-service/ returned 28 results

Sort Results:

Relevant Recent
Security News

10 steps to safety

So your systems have been compromised — a distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your users’ desktop machines. Now what do you do? Here are 10 steps to help safeguard your systems in the future.
Features

Women in IT Security: Academics and Voting

Academics Shafi Goldwasser is a professor of electrical engineering and computer science at MIT. Over the course of her career, she has made fundamental contributions to cryptography, computational complexity, computational number theory and probabilistic algorithms. In cybersecurity, Goldwasser’s achievements include helping to invent a “hybrid” technique to show that independently encrypting individual bits causes the…
Game play: A case study in security
Features

Game play: A case study in security

It's not all fun and games at Brady Distribution Co., a supplier of arcade entertainment, especially when malware and DDoS attacks are involved. Learn how the organization fought against the threat.
Security News

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good guys fight back can make or break the company’s ability to survive the threat.
Features

Buy-in from the boss

For the most part, your senior management understands the necessity of running a secure company, reports Angela Moscaritolo.
Cybercrime

2017 Biggest Cybercrime Arrests

Cybercriminals often elude authorities but sometimes law enforcement makes a big score and miscreants find themselves in front of a judge and eventually behind bars.
Security News

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldnt believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Features

Cyberthreats: A long haul

Enterprises are under constant seige from cyberthreats that continue to evolve to new levels of sophistication, reports Deb Radcliff.
Next post in Features