Could IPv6 Result in More DDoS Attacks?

Could IPv6 Result in More DDoS Attacks?

With the growing popularity of IPv6 (Internet Protocol Version 6), so the possibility of this protocol providing a gateway for Distributed Denial of Service (DDoS) attacks has also increased. Developed by the Internet Engineering Task Force (IETF) to replace the forthcoming exhaustion of IPv4, IPv6 became a Draft Standard in ... Read More
Cyber Risks of Online Gaming

Cyber Risks of Online Gaming

As computer gaming companies rush to get their latest products onto the market, this haste may be providing a serious cybersecurity vulnerability. Prior to launching the next great computer game hit, online gaming companies have a choice—release their games on all platforms simultaneously, or release them in dribs and drabs ... Read More
Criminals Hacking CPUs to Mine Cryptocurrencies

Criminals Hacking CPUs to Mine Cryptocurrencies

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the ... Read More