How statistics-based attacks work

How statistics-based attacks work

| | IT Security
Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a host at such an extreme rate that the host becomes overwhelmed, so can no longer fulfill genuine requests – the classic Denial of Service or DoS attack (from a ... Read More
How do signature based attacks work?

How do signature-based attacks work?

| | IT Security
Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based attack or PoD. This is what’s known as a signature-based attack because it’s relatively easy to recognise (so has a tell-tale signature). It’s also known as a ‘one/two-packet ... Read More
How do firewalls work

How do firewalls work

| | IT Security
Firewalls are something we take for granted, but as we’ve seen from some recent high profile security breaches, even the best firewalls are imperfect. A carefully-crafted Phishing email can be tricky to spot and attackers exploit the weakest link in the security chain, which is the end user clicking on ... Read More
The race for our attention - What do we really want to do in our lives?

The race for our attention – What do we really want to do in our lives?

The best way to get someone’s attention is to know how their mind works. If you have teenage children, you may be aware of Snapchat Streak, which keeps a record of the number of consecutive days on which somebody has communicated with one of their friends. This is something that ... Read More
NCSC Advice about ZTE Equipment & Services

NCSC Advice about ZTE Equipment & Services

| | IT Security
The National Cyber Security Centre (part of GCHQ) is the UK’s authority on cyber security. Its main purpose is to reduce the cyber security risk to the UK by improving its cyber security and cyber resilience. On 16th April 2018, the NCSC announced that its Technical Director, Dr Ian Levy, ... Read More