pulse wave

Pulse Wave is a New Technique Using an Old Attack

DDoS

Before we get into the nitty-gritty of how the pulse wave attack behaves, we must first define what a distributed-denial-of-service (DDoS) and denial-of-service (DoS) is, so we are all on the same page. Instead of regurgitating text from resources on the internet I have included a nice quote from Wired.

Simple DoS attacks, performed from a single machine, are uncommon these days. Instead, they’ve been supplanted by DDoS attacks, distributed denial-of-service attacks that come from many computers distributed across the internet, sometimes hundreds or thousands of systems at once. The attacking machines are generally not initiating the assault on their own but are compromised machines that are part of a botnet controlled by hackers who use the machines as an army to target a website or system.

(more…)

best practices wireless networks

Security Best Practices for Wireless Networks

The key to securing data is to have positive control of it so only the people that need to access it can and when they need to. Wireless networks pose a challenge to this goal because unlike wired connections wireless networks are reachable for up to 100 feet outside of the home or business. If someone is within the range of the signal, then they have the opportunity to gain unauthorized access to your information. The following is a list of best practices for securing your wireless network. (more…)

Rainbow and Waterfall

How Much Do You Trust Your Antivirus Company?

Do you know which data your antivirus collects during scans? Antivirus has kernel level access to the operating, meaning there isn’t a file on your computer hard drive that it can’t touch. Antivirus scans data that is being read from and written to the hard drive, and depending on which antivirus company you choose, data in memory could be examined giving you greater protection. (more…)