Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How to Handle Website Attacks Your Security May Not See Coming

    By
    Chris Preimesberger
    -
    May 16, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How to Handle Website Attacks Your Security May Not See Coming

      1 - How to Handle Website Attacks Your Security May Not See Coming

      by Chris Preimesberger

      2Revisit Your Website Security Strategy

      2 - Revisit Your Website Security Strategy

      Website hacks are not just about stealing an organization’s data; even without data, you are still a target. Ask yourself: Are maintenance, operation, tuning, training, deployment and setup the right things on which to spend time? What if you could focus on incident response, visibility and reports, and ROI?

      3Attack Example No. 1: Application-Level DDoS

      3 - Attack Example No. 1: Application-Level DDoS

      This is carried out by sending a large amount of innocent-looking traffic to the Website. All it takes are just a few thousand requests per second to kill most of today’s application stacks. If there is just an order of magnitude more, even the servers could buckle and crash the site. This is relatively easy to generate but extremely hard to separate between the distributed denial-of-service (DDoS) traffic and the legitimate user traffic.

      4Attack Example No. 2: Website Backdoors

      4 - Attack Example No. 2: Website Backdoors

      Gaining access to a backdoor on a Website provides hackers with full control over the Web server and application. They often use that control to carry out attacks on targeted Websites or to steal information. It is difficult to detect because hackers will gain root privileges and use them to hide the backdoor.

      5Attack Example No. 3: DNS Hijacking

      5 - Attack Example No. 3: DNS Hijacking

      This involves taking over your domain registrar account and taking ownership over your domain. The Website will go down, and, as a result, the site will lose all search engine optimization (SEO) ranking and reputation associated with the domain. The art of password hacking is much more advanced today than five years ago. The weakest link just may be the domain registrar’s password.

      6Attack Example No. 4: Content Scraping

      6 - Attack Example No. 4: Content Scraping

      This hacking method automatically collects business intelligence from a Website and is executed by impersonating trusted Googlebots. It is used to eliminate a company’s competitive advantage. For example, hackers may scrape a product catalog and all its prices.

      7Googlebot Impersonators a Serious Problem

      7 - Googlebot Impersonators a Serious Problem

      Industry research reveals that 16.3 percent of sites suffer from Googlebot impersonation attacks of some kind. Among those targeted sites, 21 percent of those claiming to be a Googlebot were impersonators. The vast majority of impersonators post comment spam and also steal Website content.

      8Attack Example No. 5: Abuse by Automation

      8 - Attack Example No. 5: Abuse by Automation

      In this hack, legitimate Website functions are automated to harm the business. These can include fake account registrations, fake comments or votes, or fake checkouts. These attacks create a high operational overhead and loss of time and money. They are very hard to deal with because this traffic is invisible to most analytics tools and it appears legitimate to network admins.

      9High Percentage of Site Visitors May Be Intruders

      9 - High Percentage of Site Visitors May Be Intruders

      Incapsula’s industry research reveals that 31 percent of Website visitors are likely to be damaging intruders. Google Analytics doesn’t show users 51 percent of Website traffic—including hackers, spammers and non-human stalkers.

      10Adapt Current Security Strategy for New Threats

      10 - Adapt Current Security Strategy for New Threats

      To deal with new threats effectively, a security strategy must include the following: a) visibility: be sure to stay informed on what is happening from the beginning of the process to the bottom line; b) perimeter security: make sure attacks are stopped on the perimeter, before reaching the network; and c) agility: use security experts who can rapidly respond to new attack techniques.

      11New Line of Defense: Cloud-Based Web Application Firewalls

      11 - New Line of Defense: Cloud-Based Web Application Firewalls

      Cloud-based WAFs, which were recently made available, provide a new service model for online security. They eliminate maintenance, operation, tuning, training, deployment and setup costs; stop attacks at the perimeter; and gain full visibility and are up-to-date with the latest security features.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×