Details about the Denial of Service attack that disabled Twitter access

Recently, the micro-blogging platform Twitter was down for more than two hours, thereby denying access to many users across the world for that time. The culprit was found to be a Denial of Service attack launched by multiple zombies sitting on networked computers (Also called as Distributed Denial of Service attacks). We give an introduction to Twitter and DoS attacks in this article.

Continue reading

Host Integrity Check for Endpoint and Network Security

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforce the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of the network (Like latest patches, signature updates etc), the components of such a solution, host integrity check for managed, unmanaged and unmanageable endpoints, challenges for deploying host integrity check applications.

Continue reading