Under Attack Now?

Call Neustar +1-855-727-1209

Neustar’s DDoS protection experts can mitigate the danger. Blending years of experience, proven methods and best-of-breed equipment, Neustar will defuse the attack to help you restore service. The Neustar Security Operations Center is available 24/7 to manage your response to every type of attack. Get more information »

The Latest on DDoS

  • Smokescreening: Data Theft Makes DDoS More Dangerous

    Smokescreening: Data Theft Makes DDoS More Dangerous

    April 23, 2014

    It’s called “smokescreening” and it’s costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. Attackers now use DDoS as a smokescreen for malware or virus insertions.…

  • WordPress Ping-Back Amplification DDoS Attack

    April 11, 2014

    Back in the day, amplification DDoS attacks stuck to a basic script. They would be UDP based, spoof the source address of the victim, query unrestricted “open” recursive DNS servers for a domain that had a large response, and voila—…

  • WordPress Ping-Back Amplification DDoS Attack

    April 11, 2014

    Back in the day, amplification DDoS attacks stuck to a basic script. They would be UDP based, spoof the source address of the victim, query unrestricted “open” recursive DNS servers for a domain that had a large response, and voila—…

  • Heartbleed Vulnerability

    April 11, 2014

    Your solution for DDoS mitigation may have been impacted by the Heartbleed vulnerability.  OpenSSL is an open source implementation of SSL/TLS widely used across many popular sites on the internet to secure login information, account info and even financial details. …

  • FDIC Issues "Expectations" for Banks around DDoS

    April 3, 2014

    The wave of attacks initiated by Al Quassam against the US financial institutions from late 2012 through 2013 were like nothing the IT and Security industry had seen before.  Large, debilitating DNS reflection attacks brought banks to a standstill –…

  • Blocking Amplification Attacks: Sometimes the Incentives Work against You

    Blocking Amplification Attacks: Sometimes the Incentives Work against You

    Attacks  
    April 3, 2014

    Since the end of last year, amplification attacks have been increasingly used by attackers and received heavy media coverage.  Everyday protocols not given much thought before, like Network Time Protocol (NTP), can be asked in a very short remote command to…

  • Video: What Does a DDoS Attack Look Like?

    Video: What Does a DDoS Attack Look Like?

    March 18, 2014

    We know what the results of a DDoS attack look like: huge disruption, brand damage, and potential revenue loss of tens of thousands of dollars per hour. But what does the attack itself look like? This video visualization, filmed in…

  • Capturing DDoS in Monitoring: Netflow/Peakflow Monitoring - Part 3 of 3

    March 16, 2014

    So far, we’ve covered internal monitoring applications and external third-party solutions. Wrapping up our three-part service, let’s take a look at two more ways to monitor for DDOS attacks. Option #3 – Netflow / Peakflow Traffic Analysis & Monitoring Monitoring Netflow…

  • Why Managed DNS Means Secure DNS

    Why Managed DNS Means Secure DNS

    DDoS 101  
    February 19, 2014

    Home security systems are designed to keep intruders out. But even with the most advanced systems in place, vulnerabilities still exist. Something as simple as an old cellar door may provide a clear and undetected path for trespassers. The same…

  • How to Protect Against Computer Viruses & DDoS Attacks

    How to Protect Against Computer Viruses & DDoS Attacks

    December 23, 2013

    In the old days, by which I mean the late 1990’s, to distribute a virus you had one option: email. From the fake “Hello” emails to the promise of pictures of rewards and prizes, this was the only way to…