phone number

Archive for the ‘ARTICLES ’ Category

Akamai PLXsert’s Q3 2014 State of the Internet – Security Report Released

Posted on: October 24th, 2014 by


Akamai Logo

Akamai Technologies, the leading provider of cloud services for delivering, optimising and securing online content and business applications, has announced availability of the Q3 2014 State of the Internet – Security Report. Akamai’s Prolexic Security Engineering and Research Team (PLXsert) is a recognised leader in Distributed Denial of Service (DDoS) protection services and strategies. This quarter’s report, which provides analysis and insight into the global attack threat landscape including DDoS attacks, can be downloaded at

“DDoS attack size and volume have gone through the roof this year,” said John Summers, vice president, Security Business Unit at Akamai Technologies. “In the third quarter alone, Akamai mitigated 17 attacks greater than 100 gigabits-per-second, with the largest at 321 Gbps. Interestingly, we witnessed none of that size in the same quarter a year ago and only six last quarter. These mega-attacks each used multiple DDoS vectors to deliver large bandwidth-consuming packets at an extremely high rate of speed.”

A brute force approach characterised the most significant campaigns in Q3 as attackers shifted towards new attack methods and enhanced older attack methods to consume more bandwidth. These record‑setting DDoS attack campaigns marked an 80 percent increase in average peak bandwidth in Q3 compared to the previous quarter and a four-fold increase from the same period a year ago. Q3 also saw an increase in average peak packets per second, recording a 10 percent increase over the previous quarter and a four-fold increase compared the same quarter in 2013.

Malicious actors have found ways to involve a wider base of devices to expand DDoS botnets and produce larger DDoS attacks. PLXsert has observed botnet-building efforts in which malicious actors sought to control systems by gaining access through vulnerable web applications on Linux-based machines.  Attackers have also expanded to a new class of device including smartphones and embedded devices, such as customer-premises equipment (CPE), home cable modems, mobile devices, and a great variety of Internet-enabled devices including home-based and wearables within the category of the Internet of Things (IoT).

Attacks with both high bandwidth and high volume were made possible by the use of multi-vector attack methods.  More sophisticated, multi-vector attacks became the norm this quarter, with more than half (53 per cent) of all attacks utilising multiple attack vectors. This was an 11 per cent increase in multi-vector attacks compared to last quarter, and a nine percent increase compared to Q3 2013. Multi-vector attacks have been fueled by the increased availability of attack toolkits with easy-to-use interfaces as well as a growing DDoS-for-hire criminal industry.

Highlights from the Akamai PLXsert Q3 2014 State of the Internet – Security Report

Compared to Q3 2013

  • 22 per cent increase in total DDoS attacks
  • 389 per cent increase in average attack bandwidth
  • 366 per cent increase in average peak packets per second
  • 44 per cent decrease in application layer attacks
  • 43 per cent increase in infrastructure layer attacks
  • 5 per cent increase in average attack duration
  • 9 per cent increase in multi-vector attacks

Compared to Q2 2014

  • 2 per cent increase in total DDoS attacks
  • 80 per cent increase in average attack bandwidth
  • 10 per cent increase in average peak packets per second
  • 2 per cent increase in application layer attacks
  • 2 per cent increase in infrastructure layer attacks
  • 29 per cent increase in average attack duration
  • 11 per cent increase in multi-vector attacks
  • 183 per cent increase in high bandwidth (100+ Gbps) attacks: 17 vs. 6

Phishing attacks compromise media websites

During Q3, another kind of attack was also prominent – phishing attacks. Multiple phishing attacks targeted Google Enterprise users in order to harvest user credentials and gain access to confidential information. With this information, hacktivists successfully compromised third-party content feeds on popular media websites, such as CNN, the Associated Press and others.

The highest profile group of hacktivists targeting third-party content providers is the Syrian Electronic Army (SEA), which typically sends emails with a falsified link to a large number of employees in a targeted company or its third-party content provider. Users who click the link are presented with what looks like a login screen to harvest the user’s sign-in credentials in a form of identity theft.

Report Availability

A complimentary copy of the Akamai PLXsert Q3 2014 State of the Internet – Security Report is available as a free PDF download at

…read more

Source: Akamai PLXsert’s Q3 2014 State of the Internet – Security Report Released


Symantec donates $260,000 to not-for- profit beyondblue at the Gold Coast 600 V8 Supercars event

Posted on: October 24th, 2014 by


Symantec Logo

Donation helps Australian children build resilience against depression and anxiety as a result of cyberbullying

Symantec Corp, maker of Norton, has announced a further AUD$260,000 donation to not-for-profit organisation, beyondblue, following a donation of a similar amount last year. This donation will support beyondblue’s work helping Australian children become resilient against cyberbullying by developing activities and resources aimed at raising awareness of, preventing and dealing with the impact of cyberbullying among youth and school-age children.

Symantec handed over the $260,000 cheque to beyondblue at the Gold Coast 600 V8 Supercars event with Norton Hornets drivers Michael Caruso and James Moffatt also present.

Symantec’s managing director and vice president for the Pacific region, Brenton Smith, said, “Technology has provided a whole new platform for bullies and their torments are no longer limited to schoolyards or street corners. Cyberbullying affects people of all ages, but is especially problematic for school-age children who are now faced with bullying anywhere and anytime – at home, school or even when they are on the go.”

“Most children do not report cyberbullying incidents when they occur and parents have limited knowledge of how to help their children become resilient against cyberbullying.  We want to educate children and parents about what they can do to reduce the impact of cyberbullying and we hope our donation to beyondblue will go some way to help break the connection between cyberbullying, depression and suicide,” added Smith.

Georgie Harman, CEO, beyondblue, said:  “Symantec has this year again provided the largest corporate donation from the private sector to beyondblue. This money will help us tackle cyberbullying and is important because we are seeing an evidence based connection between cyberbullying and suicide.

“Cyberbullying, like any form of bullying or discrimination, can lead to enormous stress, which in turn can lead to depression, anxiety and suicide if it continues over time. beyondblue wants to make Australian children more resilient to cyberbullying and to achieve this we have developed online content and a fact sheet for young people. These are available at and will help build young people’s resilience and reduce cyberbullying’s impact. Given cyberbullying can lead to suicide, we are also developing resources in the form of a video and information guide that will equip parents with the tools and confidence to discuss these issues with their children.

“These resources will be available to Australians free of charge which would not have been possible without the continued support and generosity from the team at Symantec and Norton.”

Throughout this week, beyondblue’s big blue bus, which is currently on a 50,000km National Roadshow around Australia, will visit local schools on the Gold Coast. beyondblue staff will educate children and teenagers at the schools about cyberbullying, depression and anxiety disorders, and the support that is available to young people who are experiencing these.

Students at Aquinas College were lucky to be joined by Norton Hornet Drivers, Michael Caruso, James Moffat, Dean Fiore and Taz Douglas as part of the beyondblue big blue bus visit, where they learned about the driver’s experiences at school and the issues they deal with being a public face on social media.

Following a podium finish at Bathurst, driver James Moffat of the #360 Norton Nissan Altima was thrilled to be part of the school visit and included in the donation handover.

“It’s fantastic that Norton is able to deliver another huge donation to beyondblue and, as drivers and as a race team, we’ve been more than happy to raise awareness for such a great cause,” said James Moffat.

For the first time, the bright yellow Norton cars will support the nickname of the each driver on the sides of the vehicles as they lap the famous Gold Coast circuit.

“At the Gold Coast 600 this weekend, we’ve changed the branding on the sides of our cars, replacing Norton with our nicknames. Mateship and camaraderie are fundamental elements for beyondblue when dealing with cyberbullying, depression and anxiety, so while ‘Moff Dog’ might look odd down the side of a race car, it’s the friendship that we have within the team that helps us achieve at the highest level – both on and off the track.”

Cyberbullying Prevention Tips

  1. Use caution when giving out mobile phone numbers or email addresses, or other social media contact information.
  2. Do not reply to threatening or disturbing emails, as this will only encourage the bully. If others in a chat or online discussion become unpleasant, leave the conversation.
  3. Make use of the privacy and security settings on social networking sites, as this will prevent bullies from seeing information they can use against their victims.
  4. If a child is being cyberbullied they should tell someone they trust, whether it is a friend, parent, teacher, or other person who works with youth.
  5. Keep any emails, messages, or texts as evidence of the bullying and block email addresses or specific users on certain social networks, so messages are no longer received.
  6. If you need to speak with someone about cyberbullying, depression or anxiety, contact beyondblue on or 1300 224 636.

Since partnering with beyondblue in 2013, Symantec has donated a total of $560,000 to beyondblue to help fight cyberbullying and prevent depression and anxiety disorders for all Australians.

The post Symantec donates $260,000 to not-for- profit beyondblue at the Gold Coast 600 V8 Supercars event appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Symantec donates $260,000 to not-for- profit beyondblue at the Gold Coast 600 V8 Supercars event


2014 Australian Security Industry Awards for Excellence Winners announced at Sydney ceremony

Posted on: October 24th, 2014 by



Members of the Australian security industry convened at The Ivy Ballroom in Sydney for the 2014 Australian Security Industry Awards for Excellence; the peak national awards for security professionals.

An initiative of Australian Security Industry Association Limited (ASIAL), the annual Australian Security Industry Awards for Excellence promote and acknowledge the outstanding achievements of security professionals.

In its 19th year, the Australian Security Industry Awards for Excellence recognised the following outstanding individuals and organisations:

  • Security Student of the Year: Aziz Raonaq, Crown Melbourne Ltd
  • Training: MSS Security
  • Integrated Security Solutions above $250,000: Chubb Fire and Security, Attorney General’s Project
  • Integrated Security Solutions under $250,000: Fredon Security, West Belconnen ESA
  • Individual Achievement, Security Management: Hayley Morgan, CAP Security Services, 1300SMILES Stadium Contract
  • Individual Achievement, General Security: Mouhamed ‘Moe’ Abdallah, Wilson Security, Saving Lives
  • Special Security Event or Project: Charter Security, World Aids Conference – Melbourne 2014
  • In-house Security Team: Australian Turf Club, Keeping the Sport of Kings Safe.

Winners were selected by an independent panel of judges. See over for further details.

ASIAL CEO Bryan de Caires said that, in a changing security environment, the private security industry is performing a vital and ever growing role.

“These awards reflect the diverse range of services provided and recognises the key role performed by the industry in safeguarding the Australian community,” Mr de Caires said.

…read more

Source: 2014 Australian Security Industry Awards for Excellence Winners announced at Sydney ceremony


INTERPOL World launches Strategic Partners Programme to design innovative security solutions with industry to address global challenges

Posted on: October 24th, 2014 by


Facebook Banner

INTERPOL World has launched a Strategic Partners Programme with leading private-sector security solutions providers to jointly create innovative solutions to real-world security challenges faced by global police organizations, government agencies and the private sector.

As part of the programme, stakeholders across the public and private sectors, international organizations and various security domain experts will come together several times in the course of the year to identify current and future security challenges and to design innovative solutions. These will be presented at the Expo and Congress of INTERPOL World, an event owned by INTERPOL and supported by the Singapore Ministry of Home Affairs.

The Strategic Partners Programme is part of INTERPOL World 2015 which will be held from 14 – 16 April 2015 at Marina Bay Sands, Singapore. The inaugural event will focus on four domains: Cybersecurity, Safe Cities, Border Management and Supply Chain Security.

This innovative programme pushes the boundary of Public-Private Partnerships in the security sphere and complements INTERPOL’s ongoing efforts to engage the private sector more actively in finding new, technology-driven solutions to security challenges.

Strategic partners in the Cybersecurity domain, RSA, The Security Division of EMC, Symantec Asia Pacific and Microsoft will discuss and suggest solutions to improve enforcement capabilities such as malware detection, digital forensics, authentication of security systems and cybersecurity research and development.

“RSA is the premier provider of intelligence-driven security solutions. We have chosen INTERPOL World 2015 to showcase our solutions to help the world’s leading organizations solve their most complex and sensitive security challenges,” said Susan Henderson, Marketing Director of RSA Asia Pacific and Japan.

Motorola and Thales Solutions Asia will tackle key issues related to the management of Safe Cities such as command and control and prediction, modelling and simulation systems. The Expert Panel also identified the need for an intuitive platform that can integrate all information to improve situational awareness, decision making and information sharing between government agencies for incident or crisis management.

Elaborating on Motorola’s role as a strategic partner to INTERPOL World, Shamik Mukherjee, Vice President of Marketing, Asia Pacific & Middle East, Motorola, said: “Motorola Solutions helps cities harness all the information that surrounds them, synthesize it to find patterns and make smarter decisions, and then distribute it securely and instantly to the teams who need it the most.”

On Border Management, strategic partners Securiport, Entrust of Datacard Group and 3M Identity Management will work on the development of passenger data systems, simple and effective border screening systems as well as the establishment of next generation global information or data protection standards.

“Through INTERPOL World Strategic Partnership programme, Entrust continues its strategic partnership with INTERPOL to provide innovative solutions in support of a safer world. Entrust is excited to be engaged with the Expert Panel of INTERPOL World to specifically bring focus to passenger and identity data and processes in the delivery of efficient and secure border controls.” said Mark Joynes, Director of Product Management for Public Key Infrastructure & Government Solution, Entrust.

Digital Coding and Tracking Association (DCTA) and SICPA Security Solutions are tackling Supply Chain Security issues. In a bid to improve efforts in countering counterfeit and illicit trade, the INTERPOL World Expert Panel has tasked these supply chain security specialists to propose improved product verification technologies and track and trace systems that can be used not only in the pharmaceutical industry but also in the luxury goods and fast moving consumer goods (FMCG) industries. Other issues such as counterfeiting, piracy, smuggling of legitimate products and tax evasion also remain a challenge in this domain.

Mark Hill, Director of DCTA explains: “INTERPOL has demonstrated its belief that the key to combating illicit trade and ensuring the security of supply chains lies in innovative security solutions and enhanced collaborative action between governments, the law enforcement community, the private sector and consumers. This is in line with our organization’s mission.” The strategic partners will work on developing innovative solutions in product verification, empowering the public, private industry and frontline law enforcement officials in the global fight against illicit trade.

At INTERPOL World, these solutions will be presented to INTERPOL’s 190 member countries, Expert Panels comprising international organizations and key decision-makers in government and police organizations, as well as security professionals in the private sector.

The Expert Panels will be chaired by Dr. Madan Mohan Oberoi, Director, Cyber Innovation and Outreach, INTERPOL; Michael O’Connell, Director, Operational Police Support, INTERPOL; Anselm Lopez, Director, Capability Development & International Partnerships Directorate, International Cooperation & Partnerships Division, Ministry of Home Affairs Singapore; Kingsley Ejiofor, Deputy Director and Head of Legal Division, National Agency for Food and Drugs Administration and Control (NAFDAC), Lagos, Nigeria; and Michael Ellis, Assistant Director, Trafficking in Illicit Goods and Counterfeiting Sub-Directorate, INTERPOL.

The solutions shared at the event will be analyzed and then customized to suit the security needs of INTERPOL’s 190 member countries and, in the long run, encourage greater cooperation between the public and private sectors, international organizations and academia to make the world a safer place.

Please refer to Annex A for the full list of participating partners and members of the Expert Panels in INTERPOL World’s Strategic Partners Programme.

The post INTERPOL World launches Strategic Partners Programme to design innovative security solutions with industry to address global challenges appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: INTERPOL World launches Strategic Partners Programme to design innovative security solutions with industry to address global challenges


Bark and Bite? The Essential Facts on the POODLE Vulnerability

Posted on: October 23rd, 2014 by



The latest high-profile internet weakness, known as POODLE, lies in SSL version 3.0. Trustwave Threat Intelligence Manager Karl Sigler studied the vulnerability. In a new blog, he answers the big questions on people’s minds and explains how Trustwave can help … READ ALL ABOUT IT HERE

The post Bark and Bite? The Essential Facts on the POODLE Vulnerability appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Bark and Bite? The Essential Facts on the POODLE Vulnerability


Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’

Posted on: October 23rd, 2014 by



By Roger Henning
Homeland Security Asia/Pacific

Australia’s security planners have succumbed to the ‘Pike Syndrome’; now requiring an urgent need for an immediate paradigm shift in problem solving – including the approach, thinking and deployment of available resources – by those charged with responsibility for National Security, in Australia, according to Homeland Security Asia/Pacific!

HSAP January 2014 recommendations, aimed at improving G20 security, by introducing enhanced mitigation strategies, to increase capabilities, by using all resources, were sent to all Ministers involved in planning security for the Summit.

Security was breached inside Parliament House, Canberra, on 31 August 2012, when a Russian protestor threw a letter at then PM Julia Gillard; recently at the White House and now the Parliament of Canada, has been forced into lockdown. All these facilities have a high security presence, but none use A1A methodology involving the training and empowerment of all staff from cleaners to advisors – the greatest asset at any work location – especially Houses of Parliament.

Fatal events in Canada this week, proved conclusively, reliance on ‘more of the same’ technology and an armed law enforcement presence, is not and never will be a total solution to threats posed by ‘lone wolf’ attackers – even if they are not radicalized Islamic extremists. The hits in Canada will encourage IS-inspired terrorists to launch attacks, in the knowledge soft targets are easy to penetrate and destroy, in Australia and worldwide.

Western nations, including Australia, are guilty of succumbing to the ‘Pike Syndrome’ locked into old methodology of problem solving and resource usage, when the need is for a holistic all-encompassing approach.

The ‘lone wolf’ threat will not be mitigated, until Governments are willing to look outside the square. HSAP has achieved this over the last six years by developing United Nations ICAO-compliant A1A, which is used to train and engage any work force on all designated “Places of Mass Gathering”, including Parliament House Canberra, the Lucas Heights nuclear facility, airports, seaports, rail and bus terminals, sports stadiums and key installations.

One of the softest high-yield targets in Australia would be any invitation-only VIP Airport Lounge, when full of Parliamentarians. Terrorists are not all ‘dickheads’ as described by a newly elected NSW Senator. Saudi born 9/11 attackers were highly educated, patient planners, disciplined and horrifyingly successful.

The post Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’ appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’


Good Technology Acquires Macheen, Inc

Posted on: October 22nd, 2014 by


Good Technology Logo

Good Technology, the leader in secure mobility, has announced its acquisition of Macheen, Inc., a privately held, mobile cloud application service provider based in Austin, Texas. Terms of the deal were not disclosed.

Building on the company’s recent hassle-free BYOD announcement, this acquisition further enhances Good Technology’s capabilities to provide customers with embedded corporate data plan support across business-required apps, and broadens Good’s carrier relationships, offering organisations more access and choice to work with their preferred wireless operator. Additionally, these new split-billing capabilities will enable customers to tie data usage costs directly to the apps using that data, reducing regulatory risks associated with traditional mobile billing models.

“As BYOD deployments continue to become mainstream, our customers want to alleviate the risk and cost associated with rapidly increasing mobile regulations, tax liabilities and complexities around mobile reimbursement and corporate stipend programs, while at the same time carriers are looking to better serve their enterprise customers,” said Christy Wyatt, chairman and chief executive officer, Good Technology. “By acquiring Macheen and its cloud-based offering, and coupling that with expanded carrier relationships, we will be securely and cost-effectively taking more friction out of deploying secure mobile apps and workflows – further positioning Good ahead of the industry in the race to democratise mobility.”

“At Sprint, we have ripped out and replaced our entire 3G network and deployed 4G LTE in 488 cities to deliver a future-proof data experience for our customers,” said Karen Freitag, vice president, wholesale and emerging solutions at Sprint. “Adding in the ability to deliver split billing capabilities through Macheen and now Good Technology, allows us to continue delivering a high-quality customer experience and further advances Sprint’s position as the leader in enabling Mobile Virtual Network Operators (MVNO).”

Connected mobile devices are growing at an exponential rate, and enterprises are looking at how to capitalise on supporting more than just enterprise devices. According to Gartner, ” The installed base of “things,” excluding PCs, tablets and smartphones, will grow to 26 billion units in 2020, which is almost a 30-fold increase from 0.9 billion units in 2009. The component cost of Internet of Things (IoT)-enabling consumer things will approach $1, and “ghost” devices with unused connectivity will be common.

“To this point, BYOD programs were generally defined by configuration, policy control and device management for smart phones and tablets,” said Richard Schwartz, president and chief executive officer, Macheen, Inc. “Together, our joint technology will offer controlled corporate usage of a broader set of enterprise devices and beyond as the era of Internet of Things (IoT) becomes a reality.”

Macheen serves businesses of all sizes, including Easter Seals UCP North Carolina and Virginia, enabling its mobile healthcare workforce to stay connected to critical HIPAA-compliant applications, while visiting hospitals and other healthcare facilities.

…read more

Source: Good Technology Acquires Macheen, Inc


F5 Web Application Firewall Achieves “Recommended” Status from NSS

Posted on: October 22nd, 2014 by



F5 Networks has announced it has been identified as one of the industry’s top Web Application Firewall (WAF) vendors in recent benchmarking reports from NSS Labs. Specifically, F5’s BIG-IP Application Security Manager (ASM) was evaluated alongside other vendors’ offerings, earning “Recommended” status for its performance across a number of product and comparative analysis tests.

Key findings and lab results revealed that F5’s BIG-IP ASM 10200:

  • Proved effective against all evasion techniques tested
  • Passed all stability and reliability tests
  • Blocked 99.21% of WAF attacks
  • Rated at 36,130 connections per second (CPS)

“Enterprises increasingly rely on web applications to deliver mission-critical services to customers,” said Vikram Phatak, CEO at NSS Labs. “Web Application Firewalls are what keep those applications safe. Being recommended by NSS is not easy. F5’s BIG-IP ASM 10200 earned its ‘Recommended’ status by demonstrating extremely high protection coupled with low false positive rates, excellent performance, and overall value.”

NSS evaluated vendor solutions based on several security, performance, and total cost of ownership (TCO) criteria. An NSS Labs “Recommended” rating indicates that a product demonstrates outstanding performance and deserves serious consideration from customers. This rating is reserved for only the top performing products, regardless of vendor market share, size, or industry presence.

“Analyst recognition like this provides further evidence of the compelling advantages F5 security solutions offer customers,” said Mark Vondemkamp, VP, Security at F5. “With application-focused products like BIG-IP ASM and Advanced Firewall Manager, we believe we can offer comprehensive scale/performance, IP intelligence, and multiprotocol security capabilities that other vendors can’t match.”

F5’s BIG-IP ASM was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Web Application Firewall Methodology v6.2 available at The tests were conducted free of charge, and NSS did not receive any compensation in return for F5’s participation.


BIG-IP Application Security Manager is available now, as are additional solutions within F5’s security product portfolio.

…read more

Source: F5 Web Application Firewall Achieves “Recommended” Status from NSS


Akamai Warns of UPnP Devices Used in DDoS Attacks

Posted on: October 22nd, 2014 by


Akamai Logo

Akamai Technologies, Inc, the leading provider of cloud services for delivering, optimising and securing online content and business applications, has released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts the security community, device vendors, Internet service providers and enterprises to the risk of massive distributed denial of service (DDoS) attacks involving Universal Plug and Play (UPnP) devices. The advisory is available for download from Prolexic (now part of Akamai) at

PLXsert has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and office devices, including routers, media servers, web cams, smart TVs and printers. The protocols allow devices to discover each other on a network, establish communication and coordinate activities. DDoS attackers have been abusing these protocols on Internet-exposed devices to launch attacks that generate floods of traffic and cause website and network outages at enterprise targets.

“Malicious actors are using this new attack vector to perform large-scale DDoS attacks. PLXsert began seeing attacks from UPnP devices in July, and they have become common,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. “The number of UPnP devices that will behave as open reflectors is vast, and many of them are home-based Internet-enabled devices that are difficult to patch. Action from firmware, application and hardware vendors must occur in order to mitigate and manage this threat.”

PLXsert found 4.1 million Internet-facing UPnP devices are potentially vulnerable to being employed in this type of reflection DDoS attack – about 38 percent of the 11 million devices in use around the world. PLXsert will share the list of potentially exploitable devices to members of the security community in an effort to collaborate with cleanup and mitigation efforts of this threat.

“These attacks are an example of how fluid and dynamic the DDoS crime ecosystem can be,” explained Scholly. “Malicious actors identify, develop and incorporate new resources and attack vectors into their arsenals. It’s predictable that they will develop, refine and monetise these UPnP attack payloads and tools in the near future.”

Get the SSDP Reflection Threat Advisory to learn more

PLXsert replicated an attack of this type in a lab environment, demonstrating how attackers produce reflection and amplification DDoS attacks using UPnP-enabled devices. In the advisory, PLXsert shares its analysis and details, including:

  • How the SSDP protocol and SOAP requests are used in reflection attacks
  • Two example DDoS tools used to scan for vulnerable devices and launch attacks
  • Details of an observed attack campaign
  • Geographical distribution of UPnP devices involved in attacks
  • Top 10 most common headers in UPnP response payloads
  • Recommended system hardening and community action
  • DDoS mitigation

A complimentary copy of the threat advisory is available for download at

The post Akamai Warns of UPnP Devices Used in DDoS Attacks appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Akamai Warns of UPnP Devices Used in DDoS Attacks


Unmanned Ground Vehicle Market worth $8.26 Billion by 2020

Posted on: October 22nd, 2014 by


Markets Logo

This report provides a brief analysis of the application sectors of the market, emerging trends, and a detailed UAV market analysis of major countries from each region.

The major challenges include incorporating new technology before it matures and verifying the operational safety of the UGV. Survivability and adaptability to extreme environmental conditions is expected to restrain the market.

North America holds a share of almost 50% of the global market. Asia-Pacific is expected to indicate stringent growth with increasing investments in defense and commercial applications in emerging countries such as China and India. Technological advancements in UGVs, its success in combat performances, and the rising demand for non-defense applications is expected to drive the market in future. A reduction in risks to human life through UGV applications in hazardous and periculous circumstances is expected to trigger the market, globally.

Limited battery endurance to accomplish longer mission hours and defense budget cuts in the established North American and European regions restrict the UGV market growth. The increasing demand for autonomy and better operational efficiency will seek opportunities for the UGV growth.

Unmanned ground vehicle market is segmented based on categories-by type, by technology, by payloads, by application, by region, and by country. The competitive analysis includes the market share of companies in the market. The report includes an analysis of the impact of drivers and restraints country-wise and region-wise to provide a better insight of the UGV market. Technology and industry trends are also highlighted, which will provide competitive market intelligence to utilize the business opportunities.

Get a copy of the report, “Unmanned Ground Vehicle Market by Type, Technology, Payload , Application – Forecasts & Analysis – 2020 here

The post Unmanned Ground Vehicle Market worth $8.26 Billion by 2020 appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Unmanned Ground Vehicle Market worth $8.26 Billion by 2020