DDoS Attacks Mostly Used to Create Diversion, Neustar Survey Finds
Attacks increasingly used by hackers to create diversion and prevent IT security teams from detecting a bigger attack.
![margee-abrams-neustar margee-abrams-neustar](/sites/default/files/styles/landscape_750_463/public/import/IMG/398/314398/margee-abrams-neustar.jpg.webp?h=54c3d218&itok=0n3xmMTP)
The report, which surveyed around 250 IT directors, CTOs and CIOs and focused on attacks in 2014, found that 52 percent of the companies falling victim to a DDoS attack also found themselves targeted for theft—customer data, intellectual property, or funds—or a malware injection. The number is a 24 percent increase compared to 2013's statistics.
DDoS attacks are aimed at making an online service unavailable by overwhelming it with traffic. But according to the survey, it seems that this type of
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Emerging Technologies
The IMD Wrap: Quality drivers—the sticks and carrots accelerating the data quality race
Like a Formula One Grand Prix, data management is a race that can be won or lost. And just as each race is part of a larger F1 championship that pays large sums of TV money to the winning team, winning or losing one race can contribute to winning or losing an endgame with much more at stake.
This Week: Clear Street, Hudson River Trading/Google Cloud, Alveo and more
A summary of the latest financial technology news.
Start-up uses ‘Magic’ to democratize access to AI for hedge funds
Spun out of Brevan Howard five years ago, SigTech hopes its new no-code generative AI offering can help smaller buy-siders even the odds with AI models.
JP Morgan touts DLT, tokens for collateral management
Distributed-ledger technology could make moving non-cash collateral more efficient, said managing director Toks Oyebode during an Isda conference on Thursday.
Waters Wrap: The changing definition and perception of blockchain
Anthony says that questions of definition and perception are killing DLT projects in the capital markets—oh, and a lack of proven implementations.
This Week: IPC extends Google Cloud partnership, BlackRock/AIA, DTCC and more
A summary of the latest financial technology news.
Waters Wavelength Podcast: Deutsche Bank’s Boon-Hiong Chan
Boon-Hiong Chan from Deutsche Bank joins the podcast to talk about blockchain interoperability.
SocGen pushes data, analytics use cases for SG Markets
The bank is letting a handful of clients experiment with its proprietary data and models to inform their research.