We are all inundated by attacks on our website, all of the time. In fact, Netshock has had over 40 attacks in the last hour or so – but that doesn’t matter. You see, it’s not the fact that we have been attacked that matters, it’s how we respond to those attacks to minimize the damage they could cause.
In that vein, we decided to release Netshock Web Defender to the wider market. It helps you to protect your website or web application from a number of threats (outlined below). These threats are ever present and can harm our businesses greatly. By putting in preventative measures, you can reduce your infrastructure costs and increase your data security – leading to a much [...]
As a website owner, you would be forgiven for feeling like you’re being attacked from all angles. The reality is that you probably are! Even small websites and blogs are subjected to bot-driven attacks – heck, right here at Netshock we have blocked over 2,000 malicious login attempts over the last few months.
One such way to login to a system that you’re not authorised to access is to use a hacking technique referred to as a ‘brute force attack’. These use computer generated scripts to randomly create tens of thousands of passwords, in the hope that one of them will be correct and that access will be granted.
This is very similar to how you [...]
DDOS attacks have become part and parcel of being a website owner. They’re fairly common and it’s probably worth knowing what they’re all about.
DDOS stands for Distributed Denial of Service which is like the big brother of a DOS (Denial of Service) attack. To understand what DDOS is all about, it’s probably easier to go back and talk about DOS in some detail first.
The purpose of these attacks is to make an online service unavailable by throwing tonnes of traffic at the service and ‘overwhelming’ it. With a DOS attack, one computer and one internet connection is used to send an unmanageable number of packets to the remote server [...]
Social engineering is not a technical kind of hack as such. It’s more about relying on the inevitable insecurity of the human mind and playing on human emotions to gain access to a system or network. Let’s say that I wanted to social engineer my way to gain unauthorised access to your corporate network. I could use one of the below techniques.
Probably one of the most common social engineering attacks is Phishing. This is when you receive an email from a fraudulent individual – posing as a trusted corporation. For example, let’s say you bank with Santander and you received an email from Santander telling you that they have a message for you but before [...]