Network and Cloud Security Articles A Networks Blog

      No Comments on Network and Cloud Security Articles A Networks Blog

Meeting the Challenges of K 12 Remote Learning Until recently, online technology was just one area of a larger set of teaching tools and methods. While 63 percent of K 12 educators used technology in the classroom daily, primarily laptops and computers, it was still entirely possible to give lessons with nothing more than a strong voice and an engaging manner. The shift to remote learning has transformed this picture toward the digitalization. Connectivity is no longer an option—it’s now the platform through which the entire school experience is going to be delivered for millions of students nationwide. This has made network Read moreThe Domain Name System DNS is critical to the functioning of the internet.

The protocol was created more than 30 years ago to replace the process of manually updating lists of servers IP addresses on the internet/Arpanet. DNS has become increasingly vulnerable to a host of malicious attacks on networks and subscribers. Over the years, the industry has responded to these growing concerns with several security enhancements — the most recently proposed standard is DNS over HTTPS DoH. What is the Domain Name System and How Does it Work?Think of DNS as an address book that translates the IP Read moreRansomware is one of the most sophisticated and feared attacks in the modern threat landscape. A specialized form of malware, ransomware is designed to forcibly encrypt a victim’s files.

The attacker then demands a payment from the victim in exchange for the decryption key to restore access to the data upon payment. Costs can range from a few hundred dollars to millions, in addition to the disruption suffered while data remained inaccessible. And even if the ransom is paid, there’s no guarantee that the promised key will be provided. The ability of a ransomware attack to render its victim’s data Read moreWay back in the early days of the internet the 1980s every connected computer was intended to have its own unique public IP address. IP addressing was originally defined by four octets—four groups of eight bits, a standard called IPv4—which resulted in over four billion unique values actually, 4,294,967,296, so at the time it seemed we’d never run out.

IPv4 Exhaustion and Network Address Translation Fast forward to June 1992 and, as a result of the astounding growth of the internet, RFC 1338, Supernetting: an Address Assignment and Aggregation Strategy, was published. This memo was the first to discuss the Read moreDDoS attacks continue to grow in size, frequency and sophistication. DDoS botnet weapons remain as popular as ever, while modern malware is gaining new ways to infect IoT systems and recruit them as drones. Reflected amplification attacks are helping hackers intensify the impact of their efforts. In challenging times like these, for enterprise security professionals, up to date threat intelligence is a critically important part of a DDoS protection strategy to protect vital systems.

“Q2 2020: The State of DDoS Weapons,” threat intelligence report by A10 Networks security researchers, provides a detailed look at the weapons, methods, and geographies defining the current Read moreTransport Layer Security TLS is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS Hyper Text Transfer Protocol Secure. When a user visits a website, their browser checks for a TLS certificate on the site. If one is present, their browser performs a TLS handshake to check its validity and authenticate the server. Once a link has been established between the two servers, TLS encryption and SSL decryption enable secure data transport Since its initial definition Read moreThe Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs.

Taking advantage of a weakness in the way Emotet malware components were stored, white hat hackers donned their vigilante masks and sabotaged the operations of the recently revived cyberthreat. While highly effective as well as somewhat humorous, the incident shouldn’t distract attention from two unavoidable truths. First, while the prank deactivated about a quarter of all Emotet malware payload downloads, the botnet remains a very real, ongoing threat and a prime vector for attacks such as ransomware.