Staminus Blog

Articles, Thoughts, and Speculations from the Staff
transit blog-01 (1)

Service Providers and DDoS

By | Blog, Tech News | No Comments

Most often when we hear about DDoS, we focus on the target of the attack. The target is generally going to be someone providing an application service to the world – such as a video game, a website, a VoIP server, or other publicly desired service. This could be on one server for a small player in the space or it could be spread across thousands of servers for someone like Sony. In both cases, the service can be dramatically affected with the right kind of DDoS attack. The service providers that carry the traffic very seldom are concerned about the DDoS as they’re simply conduits on the Internet connecting one network to another. They carry traffic and deliver it to its destination on demand. They have sufficient capacity to do this.

But what happens when they don’t? What happens when the carrier is crushed by the sheer power of the attack? If an attack is sufficiently large, can it actually impact a service provider or carrier? More importantly, what happens when the carriers are the culprits of the DDoS attack, being used against their will to engage in widespread nefarious activities?

Read More

ipv4 blog

IPv4, IPv6 and DDoS, Part 1: How IPv4 Works

By | Blog, Tech News | No Comments

Just about everyone has heard of an IP address, and most people have some basic knowledge of what an IP address is. 192.168.1.1 is the standard gateyway that home routers use, for example. The first time you go to configure a home router, you put that IP address into your web browser. The format WWW.XXX.YYY.ZZZ is known as IPv4 format. The total number of IPs in the IPv4 IP space is 2^32 power. That sounds like a lot, but it’s really not. IPv4 depletion, as it’s known, refers to the fact that the world is running out of IPv4 IPs to give out to people. Currently, there’s less than 1% of the total IPv4 IP space left. Read More

smarthome blog (1)

DDoS from the Most Unlikely of Places

By | Blog | No Comments

“Smart” technology is all the rage these days. Everyone I know has a smart phone. They do their work from it remotely, they video chat with their family in other countries; it has basically become one of those can’t-leave-home-without-it type of  devices. “Smart” simply signifies that the device is internet ready. You can connect out from it, or into it. What does this mean for the future? How will DDoS play a role in the upcoming years as a result of smart devices?

Read More

cables blog (1)

DDoS Stress Testers – Part 2

By | Blog | No Comments

In part 1 of this series, we’ve explained what stressers are, how they work, and where they got their start. What can be said for the early years is that the level of work required to hire someone to use a DDoS attack made it a lot more prohibitive. Bandwidth was expensive, the resources hard to find, and the overall affect was lackluster in comparison to the effort required. If you weren’t capable of using a DDoS attack yourself, chances are you weren’t going to hire one either.

Today, anyone can use Google to find a stress tester and be offered a large number of options, for incredibly cheap prices. It’s gaining ground in business, gaming, finances, and sometimes just for fun, which is having a truly damaging impact on companies and customers. What a difference a decade can make! What changed? In today’s article, I will discuss in a bit more detail why there are so many stress testers around now.

Read More

cellblog-01

Your Phone is Your Computer: Protect it Like One

By | Uncategorized | No Comments

According to Cisco, global mobile data traffic grew 69 percent in 2014, reaching 2.5 exabytes per month. Facebook recently revealed that 78 percent of its US users are mobile. Apple is now the most valuable company in the history of the world. The mobile platform is quickly becoming the platform of choice for Internet users. Mobile phones have long performed far more tasks than just the phone application. Only recently, however, have they become a terrific platform to exploit and leverage to launch large-scale global DDoS attacks. Enter the age of LTE and high speed mobile DDoS botnets.

Read More

stockvault-broken-meter96789

DDoS Stress Testers – Part 1

By | Blog | No Comments

By now, we have all heard of the DDoS tool that Lizard Squad put out just after Christmas. For those that don’t recall the situation, on Christmas day, Lizard Squad DDoSed Playstation Network, Sony’s online gaming service, and Xbox Live, Microsoft’s gaming network. Connectivity to the online services was not restored until the next day. This was a big deal and got a lot of media coverage due to the fact that it was done on Christmas day, a day where people are off work and school, so the services see a lot more usage. People received video games as gifts, and found them to be useless with no network to support them.

Lizard Squad, having been using DDoS attacks against several companies already, quickly came out to claim responsibility. Soon afterwards, they announced the release of their stresser, a tool that anyone could pay to use to DDoS whoever they want. Having just sent two major companies offline and several others in the months before, they had proven the strength of their attacks in what would turn out to be an intelligent (although dubious) marketing strategy.

So what’s up with these stressers? How do they work? Why are there so many of them nowadays? Where were they all before?

Read More

rsz_12014-11-life-of-pix-free-stock-photos-harvard-boston-university-parc-leeroy

Educational Institutions and DDoS – Both Target and Origin

By | Blog | No Comments

Educational institutions have always played a pivotal role in breeding underground and counter-culture behavior. Many large DDoS attacks over the past 15 years have originated by students, often times no older than high school age. Historically, schools have had large connections with limited oversight and tracking, allowing their students to engage in nefarious behavior with little-to-no risk of getting caught. The tables have certainly turned in recent times. As corporate connections have become larger, schools are now finding themselves at odds with the underground culture they helped breed. Hacking groups are treating universities as both easy targets and easy sources of DDoS attacks.

Read More

greatwall (1)

Great Firewall of China – DDoS Machine?

By | Blog, Tech News | No Comments

China’s Golden Shield Project, also known as the Great Firewall of China (GFW), is a government controlled network firewall that monitors every bit of internet traffic generated inside of China. It is also used as a way to censor the internet in China through various methods, including: IP blocking, URL filtering, DNS filtering, and packet filtering. So what does any of this have to do with DDoS?

Read More

anonymous portrait (1)

A Brief History of DDoS – Part 2

By | Blog | No Comments

In part 1 of this series, a general history of the early rise of the Internet through IRC was discussed, as well as the beginnings of DDoS. What it was used for, and who was targeted. I covered the late 90s to the mid 2000s. These were the tame years, as far as DDoS was concerned. Although it is true that there was some amount of destruction to large online services during this time, it was relatively infrequent and hardly got any sort of the press that it gets today. In this article, I will discuss DDoS over the last 10 years: specifically hacktivism, the rise of Anonymous, the rise in the size of DDoS, and what the future holds as far as DDoS is concerned.

Read More

Related Posts

mitigate ddos attacks

Staminus is known for being one of the world’s most reliable DDoS mitigation companies today, thanks to its revolutionary global automated system recovery and replacement software. We mitigate DDoS attacks for a wide range of industries, from healthcare to government to retail. For mission-critical demands, trust only Staminus.

mitigate ddos

Businesses that depend on websites in some form or another—to process and collect information, payments, or transactions—are vulnerable to distributed denial of service attacks, which can cause catastrophic losses. To mitigate DDoS attacks, partner up with Staminus. Have a look at our website to see what we can do for you.

layer 7 ddos protection

A layer 7 DDoS attack is a complicated attack at the OSI Model application layer. They are among the hardest to mitigate because they imitate human behavior while interacting with the user interface, making them hard to separate from regular traffic. Staminus if one of the few companies to offer layer 7 DDoS protection for a wide range of industries, from banking to educational websites.

home ddos protection

There is a growing trend of DDoS attacks on personal computers used in private homes and public places, such as coffee shops and libraries. Attackers know that such computers are least protected and most accessed; moreover, users are not likely to be knowledgeable about the risks of a DDOS attack. If you need home DDoS protection then you need Staminus.

firewall ddos protection

Staminus is an expert in firewall DDoS protection and has been an industry leader for over 15 years. Don’t let distributed denial of service attacks cripple your business like they have countless others. Talk to our firewall DDoS protection experts now to understand how our technology can secure your website against attacks.

denial of service protection

Invest in reliable denial of service protection to save your business from the devastating effects of a DDoS attack. Sign up with industry veterans like Staminus, which serves clients in a range of industries, including government websites, healthcare, charities, educational institutions, and online retail shops.

ddos services

Even the most robust web infrastructures are not immune to DDoS services attacks. If your business uses a website to process critical information such as financial information, transactions, and important data, then you need Staminus. We can protect you from distributed denial of service attacks no matter what your industry. Contact our experts to learn more.

ddos service

Hundreds of websites—from banking to retail and even charities—fall victims to DDoS service attacks on a regular basis. These attacks target sites and services hosted on high-profile servers, including banks, credit card gateways, and root nameservers. Make sure your business is protected from these attacks. Talk to us at Staminus to learn more.

ddos protection services

Not all DDoS protection services are the same. Trust only Staminus if you want to be insulated from distributed denial of service attacks. We operate a globally redundant network of DDoS mitigating infrastructures and believe that redundancy is essential to reliability in mission-critical applications.

ddos protection service providers

As one of the world’s leading DDoS protection service providers, Staminus runs a global infrastructure currently spanning the US and Europe with DDoS mitigation scrubbing centers as well as a network of datacenters in New York, Los Angeles, and Amsterdam. This allows us to effectively mitigate even the largest DDoS attacks and ensure the lowest network latency.

ddos protection hardware

The DDoS protection hardware is the heart and soul of an effective DDoS security company. At Staminus, we built and designed a mitigation network of hardware appliances exclusive to us; these appliances were by our own engineers so that we can leverage the unique features of each client-industry. Talk to us now to see how we can protect you from a distributed denial of service attack.

DDoS Protection

Distributed denial of service attacks have crippled thousands of web-reliant businesses in all manner of industries, from government websites to educational institutions to travel and retail online stores. An attack can cause catastrophic financial losses. Prevent it with DDoS protection from Staminus.

ddos prevention services

If your business relies on a website in some from or another—to accept payments, process data, or sell retail, for example—then you need to invest in DDoS prevention services. Prevent a distributed denial of service attack before it’s too late. Talk to our experts at Staminus to get started.

ddos prevention service

Signing up for a DDoS prevention service is the best way to avert a distributed denial of service attack before it happens. When looking for a DDoS mitigation provider, look for a company that built and developed its own protection hardware, like Staminus. Explore our website to learn more about how we can help you.

DDoS Prevention

Don’t wait for a distributed denial of service attack to bring you down and cause huge financial losses. Sign up for DDoS prevention services now at Staminus. We serve almost all industries, including government, banking, travel and hospitality websites, and even charities. We have been in a leading DDoS mitigation company for over a decade.

ddos mitigation services

If you’ve fallen victim to a distributed denial of service attack, then you need the help of a DDoS mitigation services provider like Staminus. Our company has one of the most advanced networks for DDoS mitigation in the industry today. We cater to a wide range of clients, from educational institutions to banking.

ddos mitigation service

Staminus is a leading DDoS mitigation service provider operating a global hardware-appliance mitigation network. Our appliances were built by our own engineers, in-house; they are designed to battle DDoS attacks. Developing our own appliance platform enables us to leverage unique features and cater to each specific industry.

DDoS Mitigation

If you’ve been hit by a DDoS attack, it’s time to call the experts of Staminus. Our DDoS mitigation and security company now has over 10,000 clients globally from more than 100 countries. Our technology is designed to protect all industries—from VoIP to retail websites—from distributed denial of service attacks.

ddos firewall protection

Staminus provides DDoS firewall protection and remains on the forefront of the fight against distributed denial of service attacks. We have been in the industry for over a decade and have continued to grow our expertise in mitigating DDoS attacks to ensure timely and effective solutions. Our top-of-the-line technologies make us one of the best mitigation providers today.

DDoS

DDoS are more rampant now more than ever, and they don’t discriminate. From small online retail shops to charities to full-scale data centers, these DDoS attacks have affected countless websites and have resulted in catastrophic financial losses. If you are a victim of a distributed denial of service attack, contact Staminus for immediate help.