The DOS Attack Revisited

Recently there have been a number of news stories discussing a recent rise of the Denial of Service attacks and noting that the compromised computers used to effect the attacks seem to be servers rather than PCs as was usually the case in the past few years.

Share this:

ThreatSTOP GA Announcement

It's been a long road, with some detours along the way, but we have finally made it! ThreatSTOP release 1.0 is out.

Share this:

ThreatSTOP Features at GA

ThreatSTOP supports a wide range of commonly deployed firewalls and provides a number of additional features such as firewall log processing with graphical reporting and secure, reliable DNS.

Share this:

ThreatSTOP Servers and Contact Details

To better support our customers we have made improvements to our servers, doubled our staff, added an office in Europe, and have a new PBX and phone numbers.

Share this:

iFrame droppers and other drive-bys: how ThreatSTOP protects you.

Someone forwarded me an article from CSO Online about how the US Bureau of Printing and engraving was being used do deliver malware via an iFrame.

Share this:

The Cost of Data Loss

One of the nightmares for executives and IT managers is to have confidential data leak from the enterprise. The fact that they find themselves in the company of the US DoD, Google and numerous other high profile organizations if they do suffer such a breach is little compensation. The fact is that a data breach can lead to a catastrophic loss of reputation and trust from partners and clients and may lead to officially mandated fines and sanctions or expensive lawsuits.

Share this: