network background popup

DDoS Blog

Playbook for a DDoS Attack

How to prepare for a DDoS attackImagine the day. It’s a Friday, you just got back from a long lunch, and are thinking ahead to your weekend. A meeting, a couple of last items to clear off your desk, and then you can head home for whatever, or whomever, awaits you.Suddenly, you get a call. Your web[...]

Feb 19th 2013

Just Another Business trip to the UK?! Maybe Not… Read Carefully!!!

DOSarrest just visited London in October and it was fantastic. The city is coming off a string of recent successes with the Diamond Jubilee, the Wiggins Tour de France victory and playing host to a stellar Olympic Games. Add to that the backdrop of an energetic and dynamic metropolis, and the contra[...]

Nov 13th 2012

NetDiligence Cyber Risk Forum

Two weeks ago I had the privilege of speaking at a HB Litigation sponsored event, dubbed the NetDiligence Cyber Risk & Privacy Liability Forum. The event took place Oct 11 and 12th and was held at the Ritz Carlton in Marina Del Ray. It was a fascinating symposium that covered topics ranging from[...]

Oct 23rd 2012

Preventing eBusiness Interruption

A Q&A with Mark Teolis, General Manager of DOSarrestDenial of service (DDoS) attacks are a threat to any business with an online presence. With little effort, an attacker across the world can completely overwhelm, degrade and/or crash your business computer servers. The result is that you then l[...]

Oct 22nd 2012

HTTP/1.0 and 1.1, What are the Differences?

We here at DOSarrest often run into questions posed about the differences between HTTP versions 1.0 and 1.1, so we have developed this article based on the specifications of each to try and clear up some of the more common questions and differences between the two specifications.HTTP/1.0 was officia[...]

Oct 16th 2012

Preventative Measures for your Website against an SQL Injection Attack

SQL Injection was one of the top 10 web vulnerabilities in 2007 and 2010. Lately DOSarrest has been noticing an increase in the number of SQL Injection attempts against our clients. Whether this attack technique continues to increase in frequency, it remains to be seen. Regardless, there are mitigat[...]

Sep 28th 2012

Tactics of an SQL Injection Attack

Over the last few months, I’ve started to see a common refrain from new customers coming onboard, indicating that they were getting DDOS’d with an SQL injection and needed protection. Each of these customers would describe different circumstances and impact to their websites, and the only simila[...]

Sep 13th 2012

How To Select A DDoS Mitigation Service

Late last month, two members of the hacker group LulzSec pleaded guilty to launching distributed denial-of-service (DDoS) attacks against entities ranging from the state of Arizona to Nintendo to the CIA. Yet despite extensive media coverage of such attacks, chief information security officers are s[...]

Jul 25th 2012

Selecting a DDoS Protection Service – Beware the Checklist!

One of the golden rules in business is to know thy customer, and the Internet Security game is no exception to this axiom. When protecting a customer website from attacks, it’s essential to know every customers website features and pattern, whether it be the layout of the site, platform it is deve[...]

Jun 20th 2012

What I’ve learned about DDoS in a Hosting Provider Network

The experience of building an international backbone for PEER1, a large hosting company, over the last 11 years exposed me to a number of challenges, most notably the difficulty of dealing with Distributed Denial of Service (DDoS). DDoS’s seen in these environments vary in size and complexity, wit[...]

Apr 27th 2012

DDoS Article Categories