Podchaser Logo
Home
Prolexic DDOS Mitigation Podcast

Prolexic

Prolexic DDOS Mitigation Podcast

An Education podcast
Good podcast? Give it some love!
Prolexic DDOS Mitigation Podcast

Prolexic

Prolexic DDOS Mitigation Podcast

Episodes
Prolexic DDOS Mitigation Podcast

Prolexic

Prolexic DDOS Mitigation Podcast

An Education podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Prolexic DDOS Mitigation Podcast

Mark All
Search Episodes...
Malicious actors using the Zeus Crimeware gain control over and access to information on infected host computers, including smartphones and tablets. For example, the attacker can request a screenshot of all displayed content on a host device, w
http://bit.ly/YWe7dy | Many older SNMP devices have the ability to take public queries from the Internet enabled by default, allowing malicious actors to launch reflected DDoS attacks by directing SNMP messages at a chosen target. To stop thes
http://www.prolexic.com/knowledge-center-ddos-threat-advisory-storm-network-stress-tester-crimeware-doc-audio.html | The Storm Network Stress Tester DDoS crimeware toolkit targets Windows XP (or higher) operating systems, infecting computers wi
http://www.prolexic.com/knowledge-center-ddos-attack-report-2014-q1.html?cvosrc=3rdParty.NationalPositions.PRS-ARQ14-casestudy | In Q1 2014, Prolexic successfully mitigated its largest DDoS attack campaign against a Prolexic customer, peaking a
http://www.prolexic.com/knowledge-center-ddos-threat-advisory-dns-flooder-audio.html | By exploiting vulnerable DNS servers – or setting up their own – malicious actors can launch powerful DDoS reflection attacks using the new DNS Flooder cyber
http://www.prolexic.com/knowledge-center-ddos-attack-report-Q1-2014-attack-spotlight-audio.html | In Q1 2014, DDoS attackers chose a new and powerful DDoS technology to launch their attacks – enabling the largest attack ever to cross the Prolex
http://www.prolexic.com/knowledge-center-dos-and-ddos-attack-reports.html | Cyber attackers are choosing reflection, not infection, to launch high-bandwidth attacks. For more information listen to this audio from Prolexic
http://www.prolexic.com/why-prolexic-protected-by-prolexic-ddos-protection.html | This audio goes into depth about how DDoS attackers have been able to use the pingback function in the WordPress publishing platform to take over an attack target
http://www.prolexic.com/industries-dos-and-ddos-protection-media-entertainment-gaming.html | This audio gives details on DDoS attacks -- specifically in Q1 2014, where Media and Entertainment took the most impact of DDoS attacks.
http://www.prolexic.com/knowledge-center-white-paper-ddos-cyber-attacks-global-markets.html | The economic infrastructure provided by financial firms, including trading platforms, is essential to national economies. So that leads to the questi
http://www.prolexic.com/ | Prolexic now apart of Akamai threat advisory about NTP amplification DDoS attacks includes an analysis of how it generates a monlist payload, along with DDoS protection and mitigation techniques, and a review of two
http://www.prolexic.com | choosing a DDoS protection provider is a critical business decision. Getting it wrong can have a devastating impact on a company’s bottom line and global reputation. These are the 10 factors to consider when choosing
http://www.prolexic.com/knowledge-center-ddos-attack-report-2013-q4/twitter.html?cvosrc=3rd%20Party.National%20Positions.AR-13-Q4 | Q4 2013 set new records for the frequency and size of DDoS attacks, with one notable attack peaking at 179 Gbps.
http://www.prolexic.com | Recent years have marked a significant rise in distributed denial of service (DDoS) activity from Asia with targets within the region and around the world. Prolexic has observed malicious actors compromising Chinese an
http://www.prolexic.comMulti-vector DDoS attack campaigns make DDoS mitigation more difficult. Multiple attack vectors make it less likely the attack can be blocked with automated devices. In addition, the DDoS mitigation team has to track mor
http://www.prolexic.com/services-dos-and-ddos-mitigation.html | DDoS mitigation appliances alone are not enough to stop today’s large, brute force DDoS attacks. Attackers can overwhelm and sidestep static devices in several ways. In Prolexic’s
http://www.prolexic.com | In a recent survey, online retailers shared their opinions on the Distributed Denial of Service (DDoS) threat landscape, the likelihood of attacks and the reliability of various DDoS protection and mitigation options.
http://www.prolexic.com | SYN reflection attacks are one of the more sophisticated distributed denial of service (DDoS) attack methods and typically require some skill to execute. However, they have recently grown in popularity as they have bec
A growing trend in cyber attacks are distributed reflection denial of service (DrDos) which leverage IP-based devices such as printers and routers. By taking advantage of the functionality of the SNMP, NTP and CHARGEN protocols, attackers can t
Distributed Denial of Service (DDoS) attacks can damage your business, so it’s important to take preventive steps to defend against these events.  You should hire a DDoS mitigation service and, in cooperation with it, run tests to ensure that y
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features