"it security" Articles

Press X to DDoS (part 2)

by Neustar Engineering April 27th, 2015

DDoS is more than a nuisance for the provider of the gaming platform. The entire business hangs in the balance. DDoS can make the platform unavailable to all users. Revenue, user experience and brand reputation are all at stake. This is second in a two-part series on DDoS attacks on the gaming industry. This blog post will discuss how gaming platforms and gamers can protect themselves from DDoS attacks. Read Full Article

Client Library for Web Performance Management API

by Tyler Fullerton April 22nd, 2015

The Neustar Web Performance Management platform has a very robust API. If you haven't checked it out yet I highly recommend it, with it you can perform: instant tests, manage monitoring services and load tests, create maintenance windows, and interact with your RUM beacons and data. Read Full Article

Press X to DDoS (part 1)

by Neustar Engineering April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article

Is DDoS Mitigation a Commodity?

by Bryant Rump April 07th, 2015

As DDoS attacks have increased in number, complexity, and impact over the last few years, so has the number of DDoS mitigation service providers—in fact, there are a lot of them. Is DDoS mitigation now a commodity? Read Full Article

DNS Hijacking and Phishing

by Raymond April 01st, 2015

Over the last few months, a number of high-profile companies have been hit by cyber attack, including Twitter, Lenovo, The New York Times, and The Huffington Post. In some cases, known hacker groups, such as the Syrian Electronic Army or Lizard Squad, used two well-known techniques to penetrate the victimized systems: DNS hijacking and phishing. But several solutions available on the market today could have prevented, halted, or minimized damage from the attacks. Read Full Article