The year of 2013 saw high amounts of Distributed Denial of Service (DDoS) attacks. Beginning in March, finance, banking, and insurance companies were the focus of an assault that lasted for 14.6 days. Through the year, the attacks ranged from 20.6...
Home » Posts filed under infosec
High Amounts of DDoS Attacks in 2013
in
2013,
attack,
bandwidth,
banking,
computer security,
computers,
Data,
date,
ddos,
DDoS attacks,
DNS,
entertainment industry,
financing,
hacks,
infographic,
infosec,
insurance,
media,
quarters,
tech
- By
Mohamed Shimran
- on 3/15/2014
- 4 comments
Labels:
2013,
attack,
bandwidth,
banking,
computer security,
computers,
Data,
date,
ddos,
DDoS attacks,
DNS,
entertainment industry,
financing,
hacks,
infographic,
infosec,
insurance,
media,
quarters,
tech
The Most Audacious Hacks in Computer History
in
best,
best hackers,
best hacks,
CIA,
cold war,
computer history,
computer security,
computers,
cyber attacks,
hacks,
infosec,
internet,
security,
siberia,
spy,
tech,
technology,
trojan,
us,
usa
- By
Mohamed Shimran
- on 3/14/2014
- No comments

When we think of warfare, most people will speak of the horror. Guns, tanks, bombs and explosions. Death and destruction everywhere. This is what war brings to people and to places.
However, there’s another form of warfare that is becoming increasingly...
Labels:
best,
best hackers,
best hacks,
CIA,
cold war,
computer history,
computer security,
computers,
cyber attacks,
hacks,
infosec,
internet,
security,
siberia,
spy,
tech,
technology,
trojan,
us,
usa
The History of Hacking Culture
in
best hackers,
best hacks,
computer,
computer hacking,
computer security,
computers,
hack,
hackers,
hacking,
hacking culture,
hacking in old days,
history of hacking,
infosec,
IT,
old hacks,
tech,
technology
- By
Mohamed Shimran
- on 2/17/2014
- No comments

Hacking culture is changing and developing all the time. The modern world is full of flaws to discover and secret places to explore. It makes sense that people are fascinated with the subject, but how has it progressed over time?
In 1975 the “Robin...
What to Look for in Your Next DDoS Mitigation Provider
in
computer security,
computers,
ddos,
ddos protection,
hack,
infosec,
tech,
technology
- By
Mohamed Shimran
- on 1/21/2014
- 2 comments

DDoS attacks are serious and could be detrimental to your brand and products. You need a DDoS mitigation provider that you can trust to protect your product and image. If you are looking for a new provider, a few key components go into an excellent...
Five Reasons Security Is A Necessity When Purchasing A New Mobile Device
in
best smartphones,
computer security,
infosec,
mobile phones,
mobile security,
mobile technology,
Smartphone
- By
Mohamed Shimran
- on 1/10/2014
- 5 comments

You need security for your smartphone.
Are you thinking of buying yourself a new mobile phone this Christmas season? If so, you should know that you will need to have security installed on it as soon as you buy it, otherwise you will almost certainly...
From Freedom to Walled Gardens - The Evolution of The Internet
in
bangladesh,
blogging,
egypt,
facebook,
hack,
infographic,
infographics,
infosec,
internet,
internet safety,
internet security,
iran,
journalism,
online privacy,
online security,
privacy,
security threats,
technology
- By
Mohamed Shimran
- on 12/23/2013
- 4 comments

The Internet has given people from all over the world unprecedented ability to communicate with each other. Anyone can create content and share their thoughts and opinions with the world. The Internet is not controlled by any one central body, and...