DDoS Attacks Mostly Used to Create Diversion, Neustar Survey Finds
Attacks increasingly used by hackers to create diversion and prevent IT security teams from detecting a bigger attack.
![margee-abrams-neustar margee-abrams-neustar](/sites/default/files/styles/landscape_750_463/public/import/IMG/398/314398/margee-abrams-neustar.jpg.webp?h=54c3d218&itok=0n3xmMTP)
The report, which surveyed around 250 IT directors, CTOs and CIOs and focused on attacks in 2014, found that 52 percent of the companies falling victim to a DDoS attack also found themselves targeted for theft—customer data, intellectual property, or funds—or a malware injection. The number is a 24 percent increase compared to 2013's statistics.
DDoS attacks are aimed at making an online service unavailable by overwhelming it with traffic. But according to the survey, it seems that this type of
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Emerging Technologies
On GenAI, Citi moves from firm-wide ban to internal roll-out
The bank adopted three specific inward-facing use cases with a unified framework behind them.
How a Chinese AI firm shook the tech world
DeepSeek’s AI model is the very ethos of doing what you can with what you have.
To unlock $40T private markets, Hamilton Lane embraced automation
In search of greater transparency and higher quality data, asset managers are taking a tech-first approach to resource gathering in an area that has major data problems.
Waters Wavelength Ep. 304: Nice Actimize’s Lee Garf
Lee joins to discuss changes in communication platforms over the last few years.
DTCC revamps data distribution, collection efforts with cloud, AI
The US clearinghouse is evaluating the possibilities that cloud and AI offer to streamline the processes by which it collects and makes data available to market participants.
Agentic AI and big questions for the technologists
Waters Wrap: Much the same way that GenAI dominated tech discussions over the last two years, the road ahead will feature a lot of agentic AI talk—and CIOs and CTOs better be prepared.
Waters Wavelength Ep. 302: Connectifi’s Nick Kolba
Nick joins the show to give his views on trends in the interoperability space and the FDC3 standard.
AI co-pilot offers real-time portfolio rebalancing
WealthRyse’s platform melds graph theory, neural networks and quantum tech to help asset managers construct and rebalance portfolios more efficiently and at scale.