Category Archives: DDoS Attacks

Telegram Recovers from DDoS Attack

Telegram Messenger, which had suffered a DDoS (Distributed Denial of Service) attack recently, has reportedly recovered from the same and everything now seems stabilized, as per reports.

A ZDNet report, dated June 13, 2019, says, “Telegram Messenger has recovered from a distributed denial of service (DDoS) attack that hit its platform on Wednesday, telling its 200 million-plus users that for the moment, things seem to have stabilised.”

On June 12, Telegram had intimated users via Twitter about the DDoS attack. The Tweet said, “We’re currently experiencing a powerful DDoS attack, Telegram users in the Americas and some users from other countries may experience connection issues.”

Telegram even explained, in a rather funny and interesting manner, to users as to how DDoS attacks work- “A DDoS is a “Distributed Denial of Service attack”: your servers get GADZILLIONS of garbage requests which stop them from processing legitimate requests. Imagine that an army of lemmings just jumped the queue at McDonald’s in front of you – and each is ordering a whopper… The server is busy telling the whopper lemmings they came to the wrong place – but there are so many of them that the server can’t even see you to try and take your order.”

The users were also told how cybercriminals use botnets to make a DDoS attack almost similar to a “zombie apocalypse”, and also that it’s just about overloading the servers, thereby not at all impacting data security.
Eventually, Telegram told users that everything is ok and that things seem to have stabilized.

The fact that the timing of the DDoS attack on Telegram coincided with the Hong Kong extradition law protests organized on the platform has been pointed out. There are inferences that the attack was launched mostly from China. Telegram founder and CEO Pavel Durov has tweeted, “IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests in Hong Kong (coordinated on @telegram). This case was not an exception.”

Massive and violent protests are going on in Hong Kong opposing the government’s plans to pass a bill that would allow extraditions to China. The protests were largely organized on Telegram, Facebook, Twitter and other messaging apps, like WhatsApp and Signal. The South China Morning Post had reported that protestors were using encrypted messenger apps to organize themselves, share intelligence and avoid police detection. The report also says that a Telegram group administrator was arrested on suspicion of conspiracy to commit public nuisance.

Telegram has played a key role in the organization of the protests as it allows the creation of groups for up to 200,000 people or to create channels for broadcasting to unlimited audiences. Moreover, it is seen as a secure way to communicate and avoid China’s strict surveillance regime as it allows encryption of messages. The South China Morning Post points out that though news about the current protests is being shared over Facebook and Twitter, much of the sensitive information sharing and coordination is done using Telegram and Signal. The report also says that the public is now more concerned about privacy especially after the Facebook data breach by Cambridge Analytica and the fast development of big data and surveillance technology in the mainland.

The South China Morning Post quotes Lokman Tsui, a professor at Chinese University researching media and technology, as saying, “People are smarter around technology now. They are using tech in a way that doesn’t give you away.” The report adds that according to Professor Lokman Tsui, some apps, including Telegram, are not safe as protestors assume them to be. He points out that messages over Telegram are not encrypted by default and that most people don’t know that they have to actually turn on the encryption feature.

Also, Read:

How Companies Fight DDoS Attacks?

How to Protect Businesses Against DDoS Attacks

The post Telegram Recovers from DDoS Attack appeared first on .

Why it is Good for Online Gamers to Use a VPN

Most gamers today don’t know why it’s good for them to use a VPN (Virtual Private Network). On the contrary, they tend to think that using a VPN could slow down the internet for them and might even put their gaming accounts at risk.

Well, the truth is that there are many advantages to using a VPN while gaming. Let’s look at the reasons why it’s good for gamers to use a VPN

VPN gives you access to all kinds of games

You might not be able to access all games while browsing in the normal mode. There are many games that are not available everywhere; some of them are region-locked and hence downloadable only in certain regions or countries. But using a VPN gives you access to even these restricted or region-locked games. Well, here’s a word of caution- Do remember to read the policies of the store you are downloading or buying the game from; their policies might not be lenient enough to allow such downloads, hence go for such downloads only if the policies allow them.

VPN might let you access games earlier than others

Games are launched a day or two earlier in certain regions. Thus, if you are using a VPN, you might get the chance to download and access a game earlier than it gets released in your region.

VPN helps prevent DDoS attacks

Hackers who specialize in DDoS (Distributed Denial of Service) attacks see online gaming as one among their favorite domains. DDoS attacks targeting online gaming are on the rise. Using a VPN provides you great protection against DDoS attacks and thus secures your data to a great extent.

Some VPNs provide added security to files via encryption

Some VPNs, by offering you encrypted private networks, secures your files with an added layer of security. Encrypted files are always good as it provides extra security to files and the data therein. Hence, for gamers who use a VPN that offers encrypted network, it’s akin to ensuring added protection for files and the data stored in their computers.

Using a VPN helps reduce pings

Using a VPN while gaming helps reduce your pings. When you are accessing a game that has servers in a country where you aren’t residing, using a VPN and connecting to VPN servers in that country helps you reduce pings. This might not work with all games, because the method of routing differs for some games.

Summing it up…

To sum it up, it would be right to say that using a VPN for gaming activities offers a user numerous notable benefits. By providing access to region-locked games, by reducing pings and by helping overcome many other server-related limitations, it makes possible dynamic and multi-regional gaming for any user.

The only important thing that matters is the choice that you make regarding the VPN. You should always go for a VPN that is really good and which doesn’t have any kind of security issues. If that’s done, using a VPN can undoubtedly add to the quality of your gaming experience.

Also, Read:

Basics Of VPN Advantages And Disadvantages

Importance and Usefulness of VPN

5 Of The Best Free VPN Services

Important Factors to Consider When Choosing a VPN Provider

 

The post Why it is Good for Online Gamers to Use a VPN appeared first on .

5G Technology and Cybersecurity Concerns

5G is a modern reality, and people don’t connect it with the future concept anymore. As leading network operators announce the beginning of this new era of smart connectivity at the Mobile World Congress, that 5G will be calling the shots when it comes to shaping the future.

However, in the midst of this craze, the IT community speculated on the implications of the 5G version, wondering what exactly that means for the cybersecurity landscape. Taking a cue from history what we have learned so far is that advanced technology and adoption are a double-edged sword, which can quickly build and destroy. As reported in a recent Gartner report, in less than a year, two-thirds of companies plan to implement 5G, so it’s imperative that they prepare for a new wave of cyber threats, which will be launched on the already vulnerable environment.

Cybersecurity concerns of the 5G world

And yet this exciting new 5G world will have its share of cybersecurity challenges. Cybercriminals around the world will continue to look for ways to access user data. With billions of devices connected to the internet, they have a large attack surface to the weak link in the security chain.

In addition, the ability of hackers to cause damage and destruction is increasing exponentially. In today’s 4G world, a huge network of bots can be used on devices at home to trigger huge DDoS attacks on websites. In tomorrow’s 5G world, the same bot network could be used to eliminate a complete network of cars driving in a single city, causing chaos on the roads.

Of course, computer security is as important in the 5G world as in the 4G world – and maybe even more. A huge amount of remote sensors and smart devices connected, for example, to global supply chains will greatly increase the complexity of protecting corporate networks from intruders. The huge amount of data generated by 5G networks makes it difficult to detect deviations in the users’ behavior by hackers.

Basically, 5G is exposed to the same potential risks as its predecessors: authentication, accessibility, data security, and privacy. Since the different specifications of the 5G protocol have been transmitted by 3G and 4G networks, the vulnerabilities of these previous generations are also supported. Network degradation attacks represent a comparable and significant risk; the lack of authentication in the initial connection phase may allow opponents to downgrade the network to a 4G or 3G target so that they can exploit existing vulnerabilities.

As with any innovation, 5G will have its own share of cases in the vertical industries that require a modern level of security. Although technology offers a number of new opportunities for consumers and can transform both public and private sector industries, it is essential that cybersecurity remains at the forefront of any phase of the implementation process.

Also, Read:

The Future of Web Filtering in the Era of 5G Networks

EU’s G5 Technology Roll-out In The Age Of Anti-Huawei Publicity

Australia Doesn’t Want Huawei And Zte For Their 5G Networks

The post 5G Technology and Cybersecurity Concerns appeared first on .

The Future of Web Filtering in the Era of 5G Networks

Security professionals and network administrators today are concerned with securing fifth-generation (5G) networks from digital dangers. Of the different technologies that they use very effectively for safeguarding 5G networks, DNS filtering is notable to a great extent. Let’s discuss different aspects pertaining to the future of DNS filtering in the light of 5G network security.

On the one hand, DNS filtering provides security to 5G networks from all kinds of threats, including botnets, ransomware, phishing scams etc while on the other hand, it also works towards providing network configuration controls for better security and parental controls.

MSPs (Managed Service Providers), ISPs (Internet Service Providers) and Cloud Access Security Brokers can benefit a lot from DNS filtering, using it along with web content categorization.

The 5G era is also the era of the IoT (Internet of Things). It needs to be pointed out that DNS filtering goes a long way in protecting IoT networks, in particular those that are 5G-based, from all kinds of threats, especially the DDoS (Distributed Denial of Service) attacks that very frequently target such networks and critical IoT applications. There are immense possibilities when it comes to using DNS filtering for IoT security on 5G networks, but there still seems to be a lack of sufficient research in this area. It seems that as regards tackling 5G traffic for IoT security management, most solutions are ill-equipped.

Now, let’s dwell on another important aspect of DNS filtering in the era of 5G networks. If on one hand, DNS filtering works towards securing 5G networks, on the other hand, it’s also a big security headache as it happens to be an area of security vulnerabilities. The number of connected devices and applications seems to be increasing like never before, on a global level. With a large number of devices getting connected to the 5G network, cybersecurity could become more challenging than ever before. Most of these devices are likely to be targeted for DDoS attacks and other cyberattacks. Hence, it’s imperative that security experts as well as service providers put in extra effort to study and understand the requirements of the next-generation 5G network. They are, in fact, trying to form a clear understanding of the cybersecurity-related challenges that would come up in the future as regards 5G networks.

A highly proficient 5G-aware DNS filtering is important when it comes to securing 5G-based IoT traffic and experts are coming up with all kinds of new security frameworks that are needed to accomplish the kind of networking abilities that this situation demands. Security firms and experts are working towards devising systems that have the capability of processing 5G-aware DNS filtering rules and thus ensure maximum security against cyberattacks of all magnitudes and kinds.

Though DNS filtering contributes greatly towards providing security to the critical 5G network infrastructure, the involvement of trusted cybersecurity partners and the employment of all kinds of security technologies is also needed. Since no single cybersecurity product can assure 100% security, it’s always best to go for different techniques and technologies including two-factor authentication, antivirus software, spam filters etc and also have concrete remediation policies in place.

Coming back to DNS filtering, it helps organizations adopt effective, extensive and forward-thinking Web use policies, block access to malicious websites and do what all is needed to protect their networks from all kinds of dangers. DNS filtering, along with other technologies, definitely helps organizations protect themselves against all kinds of known and unknown cybersecurity threats and also against unauthorized access to their 5G networks.
Remember, we live in a world where the number of connected devices and applications is increasing rapidly, to the tune of millions. Thus, there is a huge pressure to ensure that all networks are secure and adaptable. Technologies like DNS filtering provide solutions to ensure the kind of security and adaptability that’s needed in this context, especially for the much advanced 5G networks.

Also, Read:

Australia Doesn’t Want Huawei And Zte For Their 5G Networks

EU’s G5 Technology Roll-out In The Age Of Anti-Huawei Publicity

Huawei a Threat to Australia’s Infrastructure, Says Spy Chief

The post The Future of Web Filtering in the Era of 5G Networks appeared first on .