The Ever-Changing Face of DDoS Attacks

By Samuel Greengard
  • Previous
    The Ever-Changing Face of DDoS Attacks

    The Ever-Changing Face of DDoS Attacks

    Hackers are using smaller, more sustained distributed denial-of-service attacks to distract IT departments while they install malware to steal a company's data.

Distributed denial-of-service (DDoS) attacks are nothing new. However, the methods are changing, and organizations that do not adapt to today's threat environment put themselves at risk. A recently released report, "Neustar DDoS Attacks & Protection Report: North America and EMEA," identifies a number of key trends. Among them: Hackers are using smaller and more sustained attacks to distract IT organizations while they install malware in order to steal a company's intellectual property, trade secrets, customer or employee information, and other valuable data. The report, based on a survey of 800 executives and professionals based in the United States, Europe and the Middle East, found that there's big money involved in today's attacks, and most attacks are substantial enough to cause significant trouble for organizations. In many cases, enterprises are caught off guard during a DDoS attack, and managers and executives don't realize the company has been infected until customers or third-parties alert them. This can lead to serious consequences. Here are some key findings from the report:

This article was originally published on 2015-10-30
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.