How statistics-based attacks work
Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...
Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...
Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...
Firewalls are something we take for granted, but as we've seen from some recent high profile security breaches, even the best firewalls are...
This week Intercity held a Cyber Security event in Birmingham as part of Intercity's drive to promote awareness with our customers and encourage them...
The best way to get someone's attention is to know how their mind works. If you have teenage children, you may be aware of Snapchat Streak, which...
The National Cyber Security Centre (part of GCHQ) is the UK’s authority on cyber security. Its main purpose is to reduce the cyber security risk to...
It’s looking like 2018 will be remembered as the year when AI (artificial intelligence) – or machine learning as I’d rather put it – lost its...
During our recent cold snap in March 2018, Birmingham Community Healthcare reported that volunteer drivers of 4x4 vehicles helped community teams...
The type of IT disaster which concerns our customers isn’t courtesy of Mother Nature, their own health, unanticipated accidents or technology failure...