Estonia learned how to combat from cyber attacks


Estonia is a country of many legends. Apart from traditional training and apprenticeships it is already a good habit among Estonian ICT companies to exchange information and experiences in various fields. Developers come together to introduce their newest tricks, testers discuss how to find flaws in systems before end users are unpleasantly surprised, cyber defence guys have formed an unofficial alliance to stay alert and be … Continue reading Estonia learned how to combat from cyber attacks

Telco Providers Security Challenges – Part 2


DDoS Attacks The common attack vectors for any DDoS would be of the following Volumetric or Flood Attacks  Bad guys shall expoit the system with arge botnets or spoofed IP to generate a lot of traffic bps or pps. The UDP-based floods from spoofed IP take advantage of connection less UDP protocol. They even take out the infrastructure capacity – routers, switches, servers, links State … Continue reading Telco Providers Security Challenges – Part 2

Telco Providers Security Challenges – Part 1


BGP Hijacking (sometimes referred to as IP hijacking, prefix hijacking or route hijacking) Routing between Autonomous Systems (AS) is achieved using the Border Gateway Protocol (BGP), which allows ASes to advertise to others the addresses of their network and receive the routes to reach the other Ases. Each AS implicitly trusts the peer ASes it exchanges routing information with. BGP hijacking is an attack against the … Continue reading Telco Providers Security Challenges – Part 1