Tagged articles
3 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2022 · Information Security

Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

The 2022 H1 Radware report reveals a 203% rise in malicious DDoS attacks, a shift from pandemic‑related threats to patriotic hacker activity driven by the Russia‑Ukraine conflict, record‑size attacks, resurging RDoS ransomware, and retail and high‑tech sectors emerging as top targets.

2022 trendsDDoSnetwork attacks
0 likes · 5 min read
Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report
AntTech
AntTech
Apr 8, 2021 · Information Security

Mobile Communication Security: From 2G/4G to 5G – Technical Risks, Attacks, and Countermeasures

The article reviews a two‑part lecture series on mobile communication security, covering the evolution from 2G/4G to 5G, detailing technical vulnerabilities such as 5G messaging, NULL SCHEME, key‑reuse attacks, IMP4GT and SLIC, and describing industry‑academic collaborations and mitigation efforts.

5G securitymobile-communicationnetwork attacks
0 likes · 10 min read
Mobile Communication Security: From 2G/4G to 5G – Technical Risks, Attacks, and Countermeasures
21CTO
21CTO
Mar 20, 2016 · Information Security

7 Surprising Attack Techniques Hackers Use to Exploit Everyday Users

This article surveys seven modern hacking tricks—from fake Wi‑Fi hotspots and cookie theft to file‑name deception, path hijacking, hosts‑file redirection, watering‑hole attacks, and bait‑replacement—explaining how they work, why they succeed, and practical defenses for users and developers.

Web Securityinformation securitymalware
0 likes · 13 min read
7 Surprising Attack Techniques Hackers Use to Exploit Everyday Users