Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Why Australian Open live streams look like Wii tennis — and what it means for sports

NPR News Headlines - Fri, 01/17/2025 - 04:00

The Australian Open's animated tennis livestreams are making a splash. U.S. leagues have used similar technology to put Simpsons on the football field and superheroes on ice skates.

(Image credit: Australian Open TV/Screenshot by NPR)

Categories: News

What question stumped a Trump cabinet pick? Find out in the news quiz!

NPR News Headlines - Fri, 01/17/2025 - 04:00

If you've paid attention to the coming inauguration, TikTok drama and the Princess of Wales' health, you'll do pretty well this week.

Categories: News

Court sentences former Pakistani leader Imran Khan to 14 years in prison

NPR News Headlines - Fri, 01/17/2025 - 03:41

Khan has denied wrongdoing and insisted since his arrest in 2023 that all the charges against him are a plot by rivals to keep him from returning to office.

(Image credit: K.M. Chaudary)

Categories: News

Standing strong against hyper-volumetric DDoS attacks

TechRadar News - Fri, 01/17/2025 - 03:25

As digital innovation accelerates, so does the scale and sophistication of cyber threats, particularly Distributed Denial of Service (DDoS) attacks. Hyper-volumetric DDoS attacks, which overwhelm systems with floods of traffic, are growing in both frequency and complexity. According to our research, more than a third (37%) of European businesses have experienced such an attack within the last year.

While disruptive in their own right, these attacks can also serve as a smokescreen for more targeted incidents, such as SQL injection attacks. While security teams tackle the immediate chaos of the DDoS attack, malicious actors can exploit unnoticed vulnerabilities.

Recently, Cloudflare mitigated a record-breaking DDoS attack peaking at 5.6 Tbps – the largest publicly disclosed attack ever. This came after a 3.6 Tbps attack earlier in the same campaign, which targeted industries such as finance, telecoms, and internet service providers. Spanning an entire month, the campaign consisted of over 100 individual incidents, many exceeding 3 Tbps in volume.

For industries that depend on real-time operations, even brief downtime can cause significant financial and reputational damage. The stakes are high, and organizations that aren’t prepared face catastrophic consequences.

A global challenge in the age of IoT

The proliferation of Internet of Things (IoT) devices has introduced new vulnerabilities into enterprise environments. These devices often comprise of security measures, including factory default usernames and passwords, while remaining constantly connected online. This creates the perfect environment for attackers to assemble botnets capable of launching large-scale, anonymous cyberattacks. Exacerbating the issue is the global distribution of these devices, making it harder to predict when or where the next attack will occur.

Recent attacks, such as the Mozi and HTTP/2 vulnerabilities originated from compromised devices in nations including the US, Russia, Brazil, and Vietnam. In these attacks, botnets composed of hijacked routers, webcams, and servers enabled attackers to strike from virtually anywhere. This global, decentralized nature of modern threats demands that organizations rethink and evolve their cybersecurity strategies.

Today’s attackers increasingly blend volumetric attacks with application-layer exploits, targeting specific system vulnerabilities. These multi-pronged tactics make detection and mitigation more complex, as various layers of an organization's IT infrastructure can be attacked simultaneously. To counter these challenges, businesses must adopt a comprehensive approach to security. Monitoring both network infrastructure and application layers is critical to identifying and addressing vulnerabilities before hackers can exploit them.

Defending against the evolving threat

Speed and precision are essential when identifying and mitigating today’s DDoS attacks. Automated systems powered by real-time machine learning and artificial intelligence have become indispensable. These technologies enable organizations to detect and neutralize threats, analyze traffic patterns, and respond instantly without human intervention. This approach means that organizations are able to prevent attacks before they have even begun – bolstering their preventative security measures further than just fighting them in real time.

Automation is a vital tool, but it’s only one piece of the puzzle. A truly effective defense requires a multi-layered security strategy that combines advanced traffic filtering, real-time analytics, and actionable threat intelligence. These systems work together to differentiate legitimate traffic from malicious activity, allowing businesses to maintain continuity without compromising performance, reliability or security. It is also important for organisations to regularly review and test their incident response plans, ensuring teams are well-prepared for real-world scenarios.

A global, high capacity, anycast network is another powerful tool in the fight against high-volume attacks. By dispersing traffic across multiple data centers worldwide, this approach ensures no single location bears the brunt of an attack, minimizing downtime and maintaining service continuity. For example, a connectivity cloud can absorb and reroute massive traffic surges through its distributed infrastructure, providing seamless, scalable protection against even the largest DDoS campaigns.

Cloud computing services also play a critical role, acting as a buffer to absorb the impact of large-scale attacks that traditional on-premises systems cannot handle. However, organizations must carefully evaluate their providers’ DDoS protection capabilities to ensure they can withstand the escalating scale of threats.

Building a resilient future

The threat of hyper-volumetric DDoS attacks is not going away. Nearly two-thirds (64%) of European business and technology leaders believe a cybersecurity incident is likely within the next year, reflecting growing concern over the evolving threat landscape.

By leveraging global infrastructure, automating defenses, and layering security strategies, organizations can build the resilience needed to face these challenges. Equally important is fostering a culture of security awareness and staying informed about emerging threats.

Cyber Resilience in the face of DDoS attacks will be a defining trait of successful organizations in the coming years. By adopting advanced tools, embracing Zero-Trust strategies, and continuously refining their cybersecurity posture, businesses can protect their systems and adapt to an ever-changing threat landscape.

We've compiled a list of the best network monitoring tools.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

China's population falls for a third straight year, posing challenges for its economy

NPR News Headlines - Fri, 01/17/2025 - 00:24

Rising costs of living are causing young people to put off or rule out marriage and child birth while pursuing higher education and careers.

(Image credit: Andy Wong)

Categories: News

Best Internet Providers in Fort Wayne, Indiana

CNET News - Thu, 01/16/2025 - 23:21
Three out of four homes have a fast fiber connection from their broadband provider in Fort Wayne. Here are our top picks for high-speed internet plans in Fort Wayne.
Categories: Technology

Today's NYT Mini Crossword Answers for Friday, Jan. 17

CNET News - Thu, 01/16/2025 - 22:57
Here are the answers for The New York Times Mini Crossword for Jan. 17.
Categories: Technology

Best Shave Club for 2025

CNET News - Thu, 01/16/2025 - 22:24
Make sure your experience and razor quality for a smooth and close shave is top notch with these shaving clubs.
Categories: Technology

Today's NYT Connections: Sports Edition Hints and Answers for Jan. 17, #116

CNET News - Thu, 01/16/2025 - 22:00
Here are some hints — and the answers — for Connections: Sports Edition No. 116 for Friday, Jan. 17.
Categories: Technology

RedNote Scrambles to Hire English-Speaking Content Moderators

WIRED Top Stories - Thu, 01/16/2025 - 20:07
Job listings posted in China this week indicate that Xiaohongshu, also known as RedNote, is struggling to handle an influx of new users joining the platform from TikTok.
Categories: Technology

Verizon Is Raising Prices for Customers With Multiple Lines and Older Plans

CNET News - Thu, 01/16/2025 - 19:50
A price hike is coming for folks with five or more lines on current plans and those still holding on to venerable plans no longer offered.
Categories: Technology

Pirate Yakuza in Hawaii Preview: Black Flag-Style Combat on the High Seas

CNET News - Thu, 01/16/2025 - 19:00
Studio RGG pulls back the curtain on the cutlass-and-rocket launcher fighting in the next Yakuza game.
Categories: Technology

Today's NYT Strands Hints, Answers and Help for Jan. 17, #320

CNET News - Thu, 01/16/2025 - 19:00
Here are some hints -- and the answers -- for the Jan. 17 Strands puzzle, No. 320.
Categories: Technology

A New Mario Kart Is Coming to the Switch 2: Here's What We Know So Far

CNET News - Thu, 01/16/2025 - 18:59
The only game revealed for the upcoming Nintendo Switch 2 looks to be the biggest Mario Kart game ever.
Categories: Technology

They Went After the Hawk Tuah Crypto Promoters. Now They're Suing Pump.Fun

WIRED Top Stories - Thu, 01/16/2025 - 18:44
The same lawyers handling a lawsuit over the infamous Hawk Tuah crypto coin are bringing a new class action against memecoin platform Pump.Fun for allegedly putting investors in high financial risk.
Categories: Technology

Best 360 Camera of 2025

CNET News - Thu, 01/16/2025 - 18:15
Capture everything around you all at once with these great 360 cameras.
Categories: Technology

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

WIRED Top Stories - Thu, 01/16/2025 - 18:14
A breach of AT&T that exposed “nearly all” of the company’s customers may have included records related to confidential FBI sources, potentially explaining the bureau’s new embrace of end-to-end encryption.
Categories: Technology

SpaceX launches its Starship rocket on latest test flight but spacecraft is destroyed

NPR News Headlines - Thu, 01/16/2025 - 18:04

After launching on Thursday, the Starship rocket caught the booster back at the pad but lost contact with the ascending spacecraft as engines went out. Officials for Elon Musk's company confirmed that the spacecraft was destroyed.

(Image credit: Eric Gay/AP)

Categories: News

Mira Murati’s AI Startup Makes First Hires, Including Former OpenAI Executive

WIRED Top Stories - Thu, 01/16/2025 - 18:01
It’s a major get for Murati’s mysterious startup, which has also poached engineers and researchers from a number of other prominent AI firms.
Categories: Technology

ICE estimates it would need $26.9 billion to enforce GOP deportation bill

NPR News Headlines - Thu, 01/16/2025 - 17:25

An internal document from Immigration and Customs Enforcement concludes it would be "impossible" for it to enforce the Laken Riley Act without significantly more resources.

(Image credit: Pool)

Categories: News

Pages

Subscribe to The Vortex aggregator