Bug bounties have become a big part of the strategy for companies to get security researchers on their side. While there are many bugs out there that fetch a higher price in the shady back channels than the bug bounties, at least the researchers are awarded something for responsibly disclosing the vulnerability to the company. Pwn2Own is one event we have seen is centered … [Read more...]
Neustar on DDoS Protection [infographic]
Neustar has created their annual report on DDoS attack and impact survey. Distributed Denial of Service attacks are harder to mitigate than DoS attacks and the results can me your website or other servers are down as a result. This can make it impossible for your customers to do business with you and cost an organization time, effort, and money. The nice thing about Neustar's … [Read more...]
Social engineering examples, methods, and stats [infographic]
Firewalls, antivirus programs, and other security measures protect our systems and data from unauthorized access. Unfortunately, there is still a means to access the data that requires no technical exploits. Humans being kind or open to manipulation can allow social engineers to get the information they want. By using the credentials of somebody that should have access they are … [Read more...]
The evolution of Gmail [infographic]
Gmail, Google's email offering that revolutionized free web-based e-mail, has turned 9 years old with the beginning of this month. On its way to 10 years old, the Gmail team created an infographic timeline of Gmail's evolution. It's fascinating to see how recent everything has been in the grand scheme of things. Check out the image after the jump. … [Read more...]
McAfee Phinds Phishers are Pheasting [infographic]
According to McAfee Labs, Spam is losing its appeal to cybercriminals. Cybercriminals made over $680 million in the first half of 2012 through phishing schemes. As a result, phishing sites increased by 70% between January and September 2012. McAfee created an infographic detailing some of this information and providing some suggestions on how to avoid being a victim to … [Read more...]
![Neustar on DDoS Protection [infographic]](https://i0.wp.com/www.404techsupport.com/wp-content/uploads/2013/04/neustar.png?resize=150%2C150&ssl=1)
![The evolution of Gmail [infographic]](https://i1.wp.com/www.404techsupport.com/wp-content/uploads/2013/04/gmail-turns-9.png?resize=150%2C121&ssl=1)