Blog Post

Infographic: How Botnets Work

By Yohai Einav, Principal Security Researcher

Posted on August 31, 2017 in: Security

Tags:

With IoT on the rise, consumers are rightfully afraid of privacy invasions. But, infected devices can serve far more sinister purposes. Herewith, we breakdown the ways a botnet works.

Read more

Blog Post

Petya/NotPetya: Ransomware Attacks in a New Form, but is it Ransomware?

By Yohai Einav, Principal Security Researcher

Petya

Posted on July 26, 2017 in: Security

Tags: ,

Ransomware has changed a lot since it was introduced back in 1989 by Dr. Joseph Popp, where 20,000 floppy disks were distributed via snail mail. The malware hid files on a victim’s hard drive and encrypted only the file names, rather than the entire files themselves. As one might assume, the entire remediation process was manual, rather than digital. Popp’s program asked victims to print the ransom note and send $189 to a bank in Panama. When he was caught, he was determined unfit to stand trial. All the money he obtained was donated to AIDS research.

Read more

Blog Post

The Importance of DNS in Security – Part 1

By Dean McDonald, Senior Director, Sales Engineering, Asia Pacific

Posted on June 13, 2017 in: Security

Tags: , ,

The importance of the DNS security protocol in general is widely understood, particularly in today’s overall security landscape. Anyone who currently manages (or has managed) caching/recursive or authoritative DNS servers knows the pain it causes when they go down. It’s bad. Without available DNS there is no internet, at least no usable internet. Generally, most, if not all applications today rely on DNS to locate resources somewhere on the internet to function. Additionally, said apps are becoming more and more reliant on the DNS.

Read more