Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cloud computing
There are still a great number of websites that do not use SSL/TLS certificates to encrypt their connections; this has been a problem in web communications security for years. There are various reasons for this; however, perhaps the most important is the fact that historically, having an SSL certificate was unviable economically, particularly for personal websites, SMEs, or small online shops...
Processes and cycles are different in Industry than in other sectors and it also integrates technology at a more leisurely pace, owing to its functional characteristics. Next Generation Networks (NGNs) based in the Cloud are no exception. This article will discuss the architectures to be used in industry, as well as the security that must come with them.
Control system applications have adapted and evolved, both in terms of changes to base software (operating system) and devices. Seizing on this need for change, applications have also adapted, and can now work online and share information in the cloud.
Like their corporate counterparts, industrial systems are constantly evolving in order to become more competitive. One of the improvements taking place in these environments at the moment is the reduction of costs through the use of cloud technology.
Industry 4.0 is a state of development in the management and organisation of the entire value chain process in the manufacturing industry. This article examines the relationship between cybersecurity for industry 4.0 and the challenges that lie ahead for it in advanced manufacturing.
Various studies have indicated that bots currently constitute over half of all global Internet traffic. Certain reports, such as "The 2015 Bad Bot Landscape Report" released by Distil Networks, Inc, even divide traffic into legitimate and malicious traffic, concluding that the latter is growing at an alarming rate. The boom that Cloud Computing has experienced in recent times has been one of...
Cloud storage services are receiving increasing popularity. But, how to choose among al the available alternatives? In this study, the main factors affecting security are described, creating a common framework for their analysis. Subsequently, these principles are applied for analyzing two of the main current solutions: Dropbox and Mega.
On the 29th of September of 2014, the European Cybercrime Centre (E3C) at Europol published a report known as "The Internet Organised Crime Threat Assessment (iOCTA)", which provides recommendations on how to act to dissuade crimes committed over electronic communication networks and how to fight against cybernetic threats. The report studies the distinguishing aspects of cybercrime with...