04/11/2018        Tech-Blog
What are DNS Amplification Attacks

DNS amplification attacks are a version of distributed denial-of-service attacks (also known as DDoS). These DNS amplification attacks use DNS servers as amplifiers. According to the Shadowserver Foundation, there are more than 3,5 million DNS servers on the planet.

Read More
03/21/2018        Tech-Blog
Game Over: DDoS Attacks on Esports

Digital gaming is booming. Once a personal hobby confined to people’s homes, online gaming is now a professional sport that attracts stadium audiences, like track and field events. Should they go down due to DDoS attacks, it may lead to financial or organizational issues, or even to the rescheduling of entire events.

Read More
03/20/2018        Tech-Blog
Student Makes X4U Doser DDoS Tool Available

Just like PDF tools or programs for blocking online ads, tools for running DDoS attacks can be simply downloaded from the internet, free of charge. One of these programs is called X4U Doser. It enables anyone to launch DDoS attacks on targets of their choosing, even without any in-depth technical knowledge.

Read More
03/14/2018        Tech-Blog
IT Security: The Many Risks Involved in the Internet of Things

IoT devices and industrial machinery are increasingly targeted by professional cyber-attacks, especially DDoS attacks. Preventing this kind of attack is the companies’ responsibility.

Read More
03/08/2018        Tech-Blog
SSL DDoS Attacks and How to Defend Against Them

The relevance of SSL encryption is on the rise, making online shopping and banking more secure. Today, more than 70 % of global website traffic is HTTPS-encrypted. The increase of SSL encryption accompanies the rising number of SSL DDoS attacks.

Read More
02/27/2018        Tech-Blog
New High-Volume Vector: Memcached Reflection Amplification Attacks

In late February 2018, the Link11 Security Operation Center discovered massive UDP attacks using UDP source port 11211. This type of attack was previously unknown. These current attacks thus represent the appearance of a new amplification vector, which the Link11 DDoS security experts call "Memcached Reflection" after initial analysis.

Read More
02/14/2018        Tech-Blog
IP fragmentation attacks – how do they work?

To understand IP fragmentation attacks, it is important to understand IP fragmentation first. IP communication is used to exchange data packets on the internet. Between their source and their target, the packets often have to be passed along by various connection technologies and systems.

Read More
02/08/2018        Tech-Blog
Deep inside CHARGEN flood attacks

The CHARGEN protocol, also known as the Character Generator Protocol, is a network service defined in 1983. Its specifications are laid out in RFC 864. CHARGEN was developed to simplify testing, troubleshooting and evaluating networks and applications. The Character Generator Protocol is based on the simple idea of providing a service that can be accessed both by TCP and UDP protocol (via port 19).

Read More
02/05/2018        Tech-Blog
Difficult times for banks due to DDoS

In late January 2018, no less than 3 of the Netherlands’ largest banks were hit by attack volumes of up to 40 Gbps. There were also DDoS attacks directed at the country’s tax office. Among the various economic sectors, the financial industry faces cyber-attacks most frequently. Banks and other providers of financial services remain very popular targets.

Read More

Page 1 from 1

Stay up to date!

Subscribe to the Link11 blog about the company, it security, and cybercrime.

Categories

Upcoming Events

@Link11GmbH