figures
Blog

Bad Bots Are Getting Smarter, Overview of The Current DDoS Landscape And More in This Weeks News

Dr. Eduardo Rocha
21.11.2016
image 3 Min read

Bots are becoming more humanlike

With new technologies, bots will soon be able to act more like humans than humans themselves. According to various reports, bot operators control a percentage of PCs around the world and users are unaware of it. In the US, one estimate was 6%. When bot operators have access to a PC, that means they have access to all of the user’s history and activities. Bots will also spend the right amount of time on each page, move the mouse across the screen as a real user would, click on the right parts of the website and so on. Contrary to what you may think, this just means that bot mitigation platforms will develop better ways to defeat bots, and GlobalDots will be here to help you pick the right one and never worry about bots again.

bad-bots

Image Source

Read more: Bizety

Kaiten, Mirai & the DDoS landscape

Akamai published an article which explains that even though many organizations think they know what the DDoS landscape looks like, it’s all based on months old information. Right now the DDoS landscape is changing faster than anything else with botnets like Kaiten that uses routers and other devices and Mirai that users IP connected cameras and DVRs. The release of Mirai is not something that can be rolled back. The code is available and everyone from amateurs to professionals who want their own DDoS botnet are looking at the code to create a bigger, better, newer version. The message here is to hope for the best, but prepare for the worst.

Read more: Akamai

Extreme surveillance laws in the UK

UK’s parliament’s House of Lords on Wednesday passed a surveillance bill that provides the government extreme powers over the data of citizens. This is now known as The Investigatory Powers Bill or “Snooper’s Law” and is currently being passed through British Parliament and is awaiting only the Royal assent to become law. This bill basically means that every ISP in UK will be required to backup all browsing data of UK users for up to a year and make it available to authorities whenever they please.

uk-cyber-security

Image Source

Read more: Hacking Threat

Facebook is buying stolen passwords on the black market

Facebook is buying leaked passwords from black market vendors to protect their users. The reason being the recent data breaches relating to Yahoo, Twitter, Linkedin, Myspace & Dropbox and the possibility of users using the same password with their facebook account as well. When Facebook purchases these passwords, they cross-reference these with the current account password and notify the user if they should use another password to protect their account. Facebook has been able to identify and alert tens of millions of users with compromised passwords.

“It turns out that we can build perfectly secure software and yet people can still get hurt”
Alex Stamos, Chief Security Officer at Facebook

Read more: Hacking Threat

Mirai has more to do with DVRs than CCTV cameras

Previously it has been speculated that the Mirai botnet, which is behind the Dyn outage and counted as the biggest DDoS attack so far, has been using CCTV cameras mostly with DVRs and routers as a supporting role. It turns out DVRs were the main players behind the attack as CCTVs offer less functionalities than DVRs and therefore are a less flexible attack platform. CCTVs also had a near-identical code to the DVRs, so this is where possibly the confusion was made.

Read more: Hacking ThreatPen Test Partners

Comments

0 comments

There’s more to see

slider item
Your Innovation Feed

eBook: Don’t Fortify, Amplify: The New Cloud Security Stack

Steven Puddephatt 25.11.21

2021’s Security leaders deal with everything from cloud-native insider threats to staying one step ahead of the unknown. While the cloud is made to amplify and speed up core business processes, the pressure to fortify cloud-borne assets from possible cyber threats painfully slows things down.  GlobalDots harnessed its 17-year cloud security experience to rethink cloud […]

Read more
slider item
Identity & Access Management (IAM)

How IT can Breeze through Onboardings without Additional Hirings

Dror Arie

Which IT Nuisance Would You Automate First? Employee onboarding is one of the heaviest, most complex operations on a company’s IT. This is especially true in fast-growing companies that may see multiple onboardings per day. And, of course, the wider a company’s software tools array, the more accounts to create and permissions to manage. In […]

Read more
slider item
Cloud Workload Protection

GlobalDots Partners with CWP Innovator Lacework

Li-Or Amir 23.11.21

In its constant endeavor to enrich its cloud security offering with the latest innovation, GlobalDots has recently introduced security unicorn Lacework to its vendor portfolio. Founded in 2015, Lacework offers a cloud security monitoring platform which brings together some of today’s top needs: Workload protection, container & K8s security, compliance monitoring. Last weekend (Nov. 18th, […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure