"it security" Articles

Press X to DDoS (part 1)

by Neustar Engineering April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article

Is DDoS Mitigation a Commodity?

by Bryant Rump April 07th, 2015

As DDoS attacks have increased in number, complexity, and impact over the last few years, so has the number of DDoS mitigation service providers—in fact, there are a lot of them. Is DDoS mitigation now a commodity? Read Full Article

DNS Hijacking and Phishing

by Raymond April 01st, 2015

Over the last few months, a number of high-profile companies have been hit by cyber attack, including Twitter, Lenovo, The New York Times, and The Huffington Post. In some cases, known hacker groups, such as the Syrian Electronic Army or Lizard Squad, used two well-known techniques to penetrate the victimized systems: DNS hijacking and phishing. But several solutions available on the market today could have prevented, halted, or minimized damage from the attacks. Read Full Article

UltraDNS Adds EDNS Support to Enhance Directional Routing

by Raymond February 17th, 2015

Neustar is continuously working to improve our UltraDNS network and services for our customers. As of Sunday, February 15th, Neustar enabled support for EDNS client-subnet requests on our authoritative UltraDNS service. Read Full Article

FAQs for SMBs: How Small and Medium Size Businesses Can Protect Against Cyberattack

by Glenn Yorkdale February 05th, 2015

Small and medium sized businesses often lack the budgets that larger companies have in protecting against cyberattack. Coupled with the fallacy that it’s primarily larger, higher profile organizations that get hacked, this has led to widespread vulnerability among smaller businesses. But there are steps these companies can—and should—take in reducing their vulnerability, all of whose benefits far outweigh their modest costs. Read Full Article