Imperva Incapsula Security and Performance Service Now Included in the Symantec Complete Website Security Solution

Imperva Incapsula Security and Performance Service Now Included in the Symantec Complete Website Security Solution – EconoTimes

REDWOOD SHORES, Calif. , April 06, 2016 — Imperva, Inc. (NYSE:IMPV), committed to protecting business-critical data and applications in the cloud and on premises, today announced that Symantec has added the Imperva Incapsula service to its Complete Website Security solution. Imperva Incapsula, a cloud-based security and performance service that enables safer, faster and more reliable websites, will round out the Symantec Website Security solution as an additional service that can quickly identify and address risks related to DDoS and other types of web attacks. The Symantec Complete Website Security solution goes far beyond encryption to deliver protection for websites, data and applications with 24/7 control that mitigates risk and helps to ensure uninterrupted performance for every website.

With the increasingly high frequency of DDoS attacks, organizations need to have proper DDoS protection in order to safeguard their websites and web applications. According to the Imperva “Q3 2015 Global DDoS Threat Landscape” report, an attack of 260 Gbps was observed, as was one that lasted 31 days. On average, the Imperva Incapsula network mitigated 129 DDoS attacks per day and a 100+ Gbps attack once every two days.  A total of 7,752 attacks were mitigated during the report period.

The Symantec Complete Website Security solution helps organizations build trust with their online users and consumers by protecting their websites and data in transit. The addition of Imperva Incapsula will extend consumer confidence by protecting websites from downtime and improving the user experience through faster website response time.

“The Symantec Complete Website Security solution gives enterprise customers a comprehensive security solution, including encryption, authentication, malware protection and vulnerability scans,” said Michael Klieman, Senior Director of Website Security at Symantec. “As DDoS attacks present a rising concern with our customer base, we are delighted to add Imperva Incapsula to mitigate that risk and round out our solution.”

“The decision from Symantec to include Imperva Incapsula in its Complete Website Security solution recognizes our leadership in this fast growing market,” said Marc Gaffan, General Manager for the Incapsula service at Imperva. “Website and application performance are critical to organizations that operate online, and the increase in sophistication and frequency of DDoS attacks show no signs of slowing. We are pleased to team with Symantec to protect organizations’ websites and applications, and look forward to strengthening our relationship with them through this agreement.”

Using Imperva Incapsula, organizations of any size can protect their businesses with enterprise-grade web application security, DDoS mitigation, performance optimization and load balancing.

For more information on the Imperva Incapsula service, please visit here. To learn more about the addition of Imperva Incapsula to the Symantec Complete Website Security offering, please visit here.

Forward Looking Statements

This press release contains forward-looking statements about the size of the market opportunity for website security products. These forward-looking statements are subject to material risks and uncertainties that may cause actual results to differ substantially from expectations. Investors should consider important risk factors, which include: the risk that demand for website security solutions may not increase or may decrease, including as a result of global macroeconomic conditions and other economic conditions that may reduce enterprise software or security spending generally; the risk that the markets that website security products address may not grow as anticipated; the risk that competitors may be perceived by customers to offer greater value or to be better positioned to help handle website security threats and protect their businesses from major risk; the risk that existing customers may focus their additional website security spending on other technologies or addressing other risks; and other risks detailed under the caption “Risk Factors” in the Imperva Form 10-K filed with the Securities and Exchange Commission, or the SEC, on February 26, 2016 and other Imperva SEC filings. You can obtain copies of Imperva SEC filings on the SEC’s website at  Any forward-looking statement made by Imperva speaks only as of the date on which it is made. Imperva is under no obligation to, and expressly disclaims any obligation to, update or alter its forward-looking statements, whether as a result of new information, subsequent events or otherwise.

About Imperva

Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more:, our blog, on Twitter.


Microsoft gives a helping hand to Vietnam’s fight against cybercrime

News VietNamNet

Vietnam, which is increasing its investments in IT Infrastructure, consumption and modernisation of businesses, banking  and finance industry, and government departments and public services, is increasingly facing the cybercrime attacks and threats, unless cybersecurity is given a comprehensive attention.

The general cyber threats are of all kinds – from compromise of systems, online banking fraud, denial of service attacks (DDoS), theft of business data, stealing confidential information and disruption of IT based services.

The problem becomes more compounded when there is a lack of awareness and sensitisation around risks from cybercrime, poor IT management and governance, insufficient cybersecurity practices, and unsecure IT supply chain through large scale use of non-genuine/pirated software.

A report by Vietnam Information Security Association (VNISA) has provided some good insights into the challenges and opportunities.

As the world’s leading IT company, what is Microsoft doing to cope with cyber crimes?

Microsoft has the longest experience in the IT industry in cybercrime issues, which provides us a very unique perspective of rising cybersecurity challenges and how to effectively deal with the trends.

We invest over $1 billion every year in security alone through innovation research and development (R&D) and strategic accusations.

For Microsoft, cybersecurity is a No.1 priority to protect its platform and infrastructure, which translates to protecting and providing security to its large customer base.

With Trustworthy Computing (TWC) initiative, which started 14 years back, an extensive attention was paid to how Microsoft engineers were coding the software in a highly secure way, to make the software inherently secure.

On top of it, Microsoft has made huge investments in building a security “built-in” strategy for all its products and cloud services, which enables our customers to protect, detect and respond faster.

What makes Microsoft very effective in analysing and assessing the rising cybercrime threats is its global security intelligence graph – a collection of high value threat intelligence through billions of end-points/systems where Microsoft software is being consumed, which gives the company visibility to the latest threats across the world.

It’s a very unique way to use “infrastructure as a sensor” to have the best intelligence in place.

Security innovations in Windows 10, enterprise grade security in Cloud solutions (Azure, Office 365 and InTune), investments in Machine Learning by way of advancements in advanced threat analytics, behavioural analytics, log analysis, access and identity management, and high-end security services, are just few examples of Microsoft’s efforts in bringing “trust” before our customers and partners.

Besides TWC, Microsoft other core assets in cybersecurity are Enterprise Cybersecurity Group (ECG), for providing best security services and solutions to its enterprise customers, Cyber Defense Operations Center (CDOC), a 24/7/365 facility manned by top security team experts in the company, to protect, detect and respond to threats to its infrastructure, facilities and customers, and the Cybercrime Center, home to Microsoft Digital Crimes Unit (DCU), a team having unique capability to disrupt cybercriminal activities at a global scale through a strong public-private partnerships. DCU also has strong threat intelligence sharing partnerships with CERTs, ISPs & Banks.

What can Microsoft offer to improve the cyber security in Vietnam?

Microsoft brings a comprehensive IT ecosystem and expertise to support cybersecurity efforts in Vietnam, particularly, through its trusted Public Cloud platform.

Microsoft has recently signed a Government Security Program (GSP) agreement with the Vietnamese government, through which it would provide designated government agencies online access to source code, information sharing of threats and vulnerability information, technical data about products and services, access to tools, and access to deeper source code review at a Microsoft Transparency Center.

Are there any differentiations between Microsoft’s security products and solutions compared to others’?

We are not competing in the security space with anyone, as much as we wish to differentiate our strong ability to provide “built-in” security capabilities of our product and cloud services, as compared to “bolt on” traditional practices.

Our Trusted Cloud principles, practices and investments around (i) privacy by design, (ii) built-in security, (iii) continuous compliance, (iv) and transparency services, provide a comprehensive peace of mind on security to our customers, while providing tremendous productivity, mobility, and cost benefits.


TD chief Masrani seeks level playing field with startup fintechs

TD chief Masrani seeks level playing field with startup fintechs – The Globe and Mail

Toronto-Dominion Bank’s chief executive officer identified tech-savvy upstarts as a key challenge for the lender, but asked policy makers to consider new rules to level the playing field with established banks.

“Thousands of fintechs are vying for bank customers,” Bharat Masrani said at the bank’s annual general meeting in Montreal on Thursday. While competition is a good thing, he argued that new financial technology players – some of which lend money to small businesses through online services – are often not subject to the same regulatory rules as traditional banks, suggesting an unfair advantage and the potential for security lapses. “That’s why I believe it would be appropriate for policy makers to consider a regulatory environment that ensures the safety of customer information and the integrity of our financial system,” Mr. Masrani said, adding that security breaches and service interruptions have plagued a number of fintechs.

In a conference call with reporters following the annual meeting, Mr. Masrani was reluctant to provide specifics on what policy changes he would like to see or examples of security breaches.

However, some of the most notable breaches in recent years have involved major firms with big budgets to defend themselves against attacks. In 2014, a cyberattack against JPMorgan Chase & Co. compromised accounts for 83 million households and small businesses. Recent attacks have also targeted Home Depot Inc., Sony Pictures Entertainment Inc. and Target Corp.

TD itself was the target of a denial-of-service attack in 2013, when a flood of online traffic knocked out access to the bank’s website and mobile banking services.

Despite highlighting fintech as a competitive threat that enjoys unfair advantages over traditional banking, Mr. Masrani made it clear that TD was hardly struggling.

He said the bank would engage with some fintech firms as potential collaborators, and sees the rise of new ideas and technology as a huge benefit to consumers.

“We engage with a wide range of firms who can support our mission to seamlessly fulfill the wants and needs of each and every customer,” he said.

Nonetheless, his point about rising competition and a potentially disruptive threat to traditional banking has been supported by many observers.

A report from Citigroup this week highlighted the threat globally. It estimated that banks in the United States and Europe will slash another 1.7 million jobs over the next 10 years – representing about 30 per cent of their current payrolls – as they react to competition in areas such as lending and payments. Investments in the fintech sector surged to $19-billion (U.S.) in 2015, up tenfold over the past five years.

“The banks have clients and scale but the new fintech entrants usually have the innovation edge, especially at the ‘client experience’ interface,” Citigroup analysts said. “To remain competitive, banks need to get innovation before the fintech companies get scale.”

Mr. Masrani appeared to agree with this assessment. He noted that TD has partnered with Cisco Systems Inc. to create a lab for building tech-focused banking enhancements and joined an international consortium to explore the benefits of blockchain, the technology that underpins bitcoin.

He also noted recent enhancements to the bank’s online brokerage, WebBroker, and announced that TD would soon launch an application called TD MySpend, which will provide customers with a visual representation of their financial health on their smartphones.

“The world is changing around us, and I cannot say with 100-per-cent certainty what the future looks like,” he told his audience. “But I do know this: TD will adapt without abandoning what you have come to expect from us.”


DDoS attacks now a threat to interior network applications: US test

DDoS attacks now a threat to interior network applications: US test – Canadian Underwriter


New test research out of the United States is shedding light on emerging trends around distributed denial-of-service (DDoS), indicating related attacks are now targeting applications inside the networks of enterprise organizations.

Released this week by information security research and advisory company NSS Labs, the finding is contained in the company’s new Security Value Map and Comparative Report. The research evaluates six leading DDoS prevention solutions for security effectiveness, performance and total cost of ownership.

“Historically, DDoS protection meant protecting an enterprise’s Internet presence. In the constantly evolving battle with cyber criminals, DDoS attacks are now targeting applications inside the networks of enterprise organizations,” notes a statement from the company.


Representing the first public Group Test for DDoS prevention solutions, the test focused on, among other things, volumetric, protocol and application DDoS attacks.

“DDoS attacks continue to grow in prevalence and have become a key pain point for security professionals,” the company points out. “While average protection against volumetric and protocol attacks ranged were 94.4% and 95.1%, respectively, the average protection against application attacks was only 80%,” it adds.

The test methodology also addressed stability and performance impact, namely the ability of a solution to maintain performance while defending against an attack. “This gives enterprise buyers a key additional element for evaluations – the ability of the solution to not only detect and mitigate the attack, but to also allow legitimate traffic while the attack is being suppressed,” the statement notes.

“While vendors have largely become adept at protecting against traditional volumetric attacks with little performance impact, stopping a protocol attack can impact performance by as much as 92.5%,” it adds.


DDoS Mitigation – Protecting Network Walls from Falling to Enemy Cyber Attacks

DDoS Mitigation – Protecting Network Walls from Falling to Enemy Cyber Attacks | Allot Blog

Firewalls and IPS have become a standard in network protection, installed in every network just like stone walls once fortified every medieval fortress or castle. Although they have greatly advanced over the years in safeguarding networks against a wide variety of cyber threats, they remain vulnerable to today’s massive DDoS attacks because of the way they are designed. Many organizations, including financial institutions, gaming companies, telecom networks and other enterprises, experience DDoS attacks even though they are equipped with a Firewall and  IPS. Ironically, during a DDoS attack these security functions are likely to become the weakest link of the entire network security.

During a DDoS attack, a cybercriminal most often attacks internet facing servers or services with massive volumetric floods (TCP SYN, UDP, and HTTP floods). These attacks are carried out using ports which are commonly open on most firewalls: 80, 53, 25 and 443, to name a few. The attacker’s goal is to employ threat vectors that exploit the weaknesses at the network/application header layer.

A firewall is a stateful device that is designed and configured to block undesired ports. Volumetric flood attacks on ports which remain open on the firewall to allow service delivery traffic, exploit the stateful nature of the firewall by filling up the state tables with volumes of unwanted traffic, so that it has little time to pass legitimate traffic. This creates a bottleneck that may result in an entirely dysfunctional firewall. Like in medieval times, when breaking a castle’s wall successfully led attackers to victory, cyber-attackers take advantage of the firewall vulnerability, utilizing DDoS as a technique to disable it, making way to a successful breach.

An IPS is deployed deeper in the network, typically behind the firewall. It allows only legitimate known traffic to pass through, while blocking a wide range of intrusions such as server exploits, code injections, cross site scripting attempts, etc. Since most of the intrusions occur at the application layer, the IPS performs deep packet inspection (DPI) to prevent them. The problem is that if an IPS has to deal with the massive volumes of DDoS traffic on top of other traffic, it becomes flooded, resulting in a bottleneck or even worse: allowing hostile traffic to pass through uninspected due to the lack of machine resources.

A Firewall, an IPS, or even a combination of the two, may give a false sense of security. Security professionals are typically aware of this issue, and are deploying separate DDoS mitigation solutions, like the Allot ServiceProtector, at the edge of their network. Allot ServiceProtector DDoS mitigation system inspects traffic and analyzes abnormalities fast and efficiently to pinpoint threats. It then instantaneously mitigates the attacks at line rates of tens and even hundreds Gbps without dropping legitimate traffic (zero false positives). ServiceProtector not only minimizes the effects of DDoS attacks on service, but also supplements the firewall and IPS systems, providing a stronger first line of defense in protecting the network against cyber enemies.



UK startup runs biggest ever simulation of the entire internet

UK startup runs biggest ever simulation of the entire internet | Information Age

A UK startup in partnership with the government has developed the largest simulation of the net’s infrastructure ever created, that could be used to test for failures in the Internet of Things

A simulated internet could help us create functioning complex smart cities without failures

A UK startup, working with the British government, has created what’s believed to be the largest simulation of the internet ever made.

London startup Improbable’s customers include computer gaming companies, financial services firms, governments and academic researchers, but this time an unnamed department of the British governmen approached the team for this ambitious project.

Their goal was to build a realistic simulation of the complete structure of the internet and the vast number of connections and networks that make up the World Wide Web, in order to see its weak spots and understand how to protect this crucial infrastructure from failure and attack.

Large-scale internet disruptions are far from rare, and often affect large portions of the world and causing widespread disruption.

In 2008, an ISP in Pakistan accidentally blocked YouTube for a large portion of the world by misconstruing a central server after it tried to block its citizens’ access to anti-Islamic content. And this January Telstra, Australia’s largest telecoms provider, suffered a country wide outage that affected 16.7 million subscribers, costing the company millions in compensation and causing massive disruption for businesses.

Underwater cables can be accidentally damaged and Distributed Denial of Service (DDoS) attacks can wreak havok on ordinary internet uses, as in the case of the 2013 attack against non-profit company Spamhaus, which cut off internet for millions of people.

And now that cities, cars, and a whole host of connected objects are becoming part of the Internet of Things, the impact of these potential outages could be even more catastrophic.
So Improbable employed its cloud-based SpatialOS software, which enables developers to create and test vast virtual worlds with an almost infinite number of variables, to make a 1:1 model of the backbone of the entire internet.

Improbable’s simulation allows you to create and delete ISPs, configure links between them, or load in data from the real world.

The whole internet contains about 60,000 AS networks and over half a million routes running between them. In order to accurately simulate this, the program uses 15 machines and over 1TB of RAM.
‘Not only did we demonstrate a dynamic model of BGP routing at scale, we also produced an interactive visualization where both AS’s and the connections between them can be created or destroyed, observing dynamic routing, cascade failures and new route propagation across the network,’ said Improbable CEO Herman Narula.
‘Doing this sort of simulation on a single server would be almost impossible, but using our operating system we were able to distribute this simulation over as many machines as we need to reach the full scale.’
The potential for the continued development of this model, and its application, is vast, say the researchers.
‘Cyber security is one of the areas where a model such as this could have a significant impact on understanding network vulnerabilities, and how different types of attacks and exploits propagate across the internet,’ he said. ‘Applications could range from protection of critical national infrastructure, right down to a safer and more secure internet for individual users.’
With a detailed simulation of the internet, people could begin to prepare for cyber attacks before they happen, understanding the vulnerabilities and the cascading effects of various interventions better.
‘This will enable businesses, institutions and even countries to become more resilient in an age of exponential vulnerability online,’ the researchers said.
Not only this, but the model is available for developers to integrate into their existing models. Improbable has imported their code into an existing city simulation project to test how smart city networks would work.
‘Being able to combine orthogonal simulations in this way will enable organizations to understand how the internet relates to other complex systems: cities, infrastructure, energy, economies,’ said Narula.

British columbia Casino Accidentally Prints 5 Secrets to Beat the House

Casinos Don’t Expect You To Do This. But They Can’t Stop You…

With the insane amount of online casino and slot machine advertising in Canada recently, people are wondering if they can actually win money by playing at any of these sites. We spoke to a PRO casino player recently and he let us in on some great secrets.

#1: Cash In On Risk-Free Money Bonuses

Competition in the Online Gambling Industry is massive with multiple billion dollar companies facing off against each other to get new players.

This has resulted in online casinos literally throwing money at people to get you through the door. This includes both risk-free money and new player deposit incentives. Some of the top online casinos like Zodiac Casino will even give you free chances to become a millionaire.

#2: Find a High Variance Slot Machine, WIN LARGER JACKPOTS

Slots are really a game of luck. The Variance is the technical term in the gaming world that is used to calculate how risky a game is to play. The lower the variance, the more frequent the wins, the less the win amount.

The high variance slots such as Mega Moolah are the ones that will pay out larger amounts of money, but the wins will happen less frequently. The less time you spend spinning the reels, the lower the house edge so we learned you need to play in short bursts, betting a little more than usual, and you’ll have a better chance of beating the odds.

If you do get a nice win, be prepared to take a break and move on to another game.

#3: Play Progressive Jackpots Online to Make Millions!

Yes, it’s true! When you bet on any of these progressive jackpot slot games, you are playing for a chance to win the jackpot, which is regularly over $1 million (currently over $3.3 million!).

We recommend trying your luck on Mega Moolah by Zodiac Casino.

The largest ever progressive jackpot won online was $15,143,600 on the 20th of January 2013 by a female player aged 47 in Finland.

#4: Not All Online Gambling Sites in Canada are Legal

It was only recently that the Canadian government deemed certain forms of online casinos gambling legal and decided to regulate it. As such, not all casino gambling websites have passed the regulation process, which requires demanding tests proving that the site is fair and honest.

For example, Zodiac Casino is a member of the Interactive Gaming Council, operating under their code of conduct to guarantee fair and honest gaming. They have been awarded Safe & Fair certification by independent auditor eCOGRA, which provides assurance for secure and honest gaming practices.

Playing on regulated online casino websites means that the funds you deposit are safe and you’ll be able to cash out quickly!

#5: Don’t Get Greedy! Cash Out Your Winnings

Lastly, perhaps the most important rule of all is “Don’t Be Greedy”.

Online casino success is about winning money – not winning money and then losing it all again. A win is a win, no matter how big or small. Set yourself targets and stick to them.

Let’s say your target is to win $250. Once you reach that amount, cash out your winnings and wait for the casino to offer you another deposit bonus and start again. Know when to quit. Don’t keep playing it all back because of greed!


Microsoft drops another big batch of Windows patches

On Tuesday Microsoft released a bunch of patches, most of which will elicit little more than a snore from users. One of the patches still hasn’t been documented — Microsoft’s posts not being in sync with its bits is common problem — and a bunch of older security bulletins haven’t been updated. But such are the vagaries of the patching business.

Take control! 30 essential OS X command-line tips

Go beyond the graphical user interface and take full advantage of Mac OS X at the command line

There are seven new patches for MS16-019, the Important security bulletin released last Tuesday that deals with .Net-based denial-of-service attacks. According to the Software Update master list, they all apply to versions of .Net in Windows Embedded. Oddly, the underlying KB articles haven’t been updated to say they pertain to Windows Embedded.

The other 40 patches (there’s a complete list on mostly apply to servers.

One patch, KB 3095113, updates Server 2012 and 2012 R2 so that they better “sync and distribute feature upgrades for Windows 10.” Apparently if you try to sync upgrades in WSUS without applying this patch, you’ll get an unholy mess that “is recoverable but the process is nontrivial and can be avoided altogether if you make sure to install the update before enabling sync of upgrades.”

As poster ch100 on AskWoody notes:

[this] was finally promoted to Windows Update in March 2016 as promised last year at the time of release. Until now it was only a hotfix and discussed here only few days ago in relation to the new behaviour of Windows 10 Upgrade for Windows 7… It applies only to WSUS on Windows 2012 R2. We may see something equivalent now in Windows 7 in the sense of a new category appearing in Windows Update.

I can hardly wait.

Poster Michael says:

Just did a sync of my WSUS server, but not a single new patch shows up (we have W7 and W2012 in our environment). I just patched KB3095113 manually on WSUS, still nothing new showing. (Although now I can see all the Windows 10 update classifications in the options, urgh.)

Another patch, KB 3105115, fixes a problem when you try to RDP into a Win 8.1 or Server 2012 R2 device while using a low-resolution screen. “When this issue occurs, you can only see the Start screen, but you can’t switch to the desktop.” That makes it hard to run a server from your phone, I suppose.

There’s an odd bug that crashes Windows Explorer if you try to play an MPEG-4 file that has a zero for the UTC time offset. If that’s been a problem for you, see KB 3136019.

Then there’s the mystery patch, KB 3115224, which is described as an optional update for Win 8.1, RT 8.1, Server 2012, Server 2012 R2, and Windows Embedded 8 standard. Other than that, I can’t find any details about it anywhere. The KB article hasn’t been posted.


Cybera partners with CIRA to offer new high-performance DNS services for Alberta’s public and education sectors

CIRA’s D-Zone Anycast Domain Name System helps improve performance for Canadian users while adding enhanced Distributed Denial-of-Service protection

EDMONTON, March 15, 2016 /CNW/ – The Canadian Internet Registration Authority (CIRA) and Cybera, Alberta’s not-for-profit technology accelerator, have partnered to offer Cybera’s members improved Domain Name System (DNS) protection and performance.

This service will be useful for larger public and education institutions in the province that run their own .ca domain, and are at risk of Distributed Denial-of-Service (DDoS) attacks. CIRA’s D-Zone Anycast DNS service will be offered to Cybera members at no cost, bringing advanced cyber-security and web-performance to public and education sector institutions of all sizes.

Key facts

  • CIRA’s D-Zone Anycast DNS service has an expansive Canadian server footprint, offering several important advantages for Canadian institutions. CIRA’s service keeps DNS data in Canada, improving performance for Canadian users and helping to limit the unnecessary flow of cross-border data.
  • With the majority of DDoS attacks originating from overseas, CIRA’s service can help to maintain network performance, even when it is experiencing a significant attack. Global servers can soak up the attack before it reaches Canadian servers, allowing D-Zone to reduce the risk of critical failures due to DDoS attacks.
  • Cybera operates Alberta’s high-speed Research and Education Network, which connects members to researchers and educators around the world. It also offers members direct peering and internet bulk-buying services, generating major network efficiencies. This new service will bring advanced cybersecurity protection to educators, libraries, and government organizations across the province, helping to increase network performance and protect these institutions from malicious attacks.

This service is available immediately, and can be accessed by Cybera members at no cost. The setup can be completed in a matter of minutes.

Executive quotes

“Our DNS service has the most expansive Canadian server footprint available on the market today. CIRA shares this intentional Canada-first approach philosophy with national research networks, making Cybera an excellent partner to launch our service with Alberta’s public and education sectors.”

- Dave Chiswell, vice president of product development at CIRA

“We are excited to be offering this free DNS service, as it will greatly improve the performance and reliability of the DNS infrastructure used by our members, who include some of the largest education and government organizations in the province. CIRA is very experienced with global DNS infrastructure and DDoS mitigation, and we are pleased to partner with them to offer this beneficial service.”

- Jean-Francois Amiot, network and operations director, Cybera

About Cybera
Cybera is a not-for-profit technology-neutral organization responsible for driving Alberta’s economic growth through the use of digital technology. Its core role is to oversee the development and operations of Alberta’s cyberinfrastructure — the advanced system of networks and computers that keeps government, educational institutions, not-for-profits, business incubators and entrepreneurs at the forefront of technological change.

About CIRA

The Canadian Internet Registration Authority (CIRA) manages the .CA top-level domain on behalf of all Canadians. A Member-based organization, CIRA also develops and implements policies that support Canada’s Internet community, and represents the .CA registry internationally.


Altcoin exchange Poloniex affected by DDOS attack

Until last night, it had been a while until DDoS attacks affected any of the popular bitcoin and altcoin exchanges.

The latest reports now indicate that a couple of hours ago, popular bitcoin exchange Poloniex was the target of a strong DDoS attack, which not only took the site offline, but it also affected the API, and therefore forced the exchange to stop carrying out transactions.

The announcement was made via a Twitter post, which read: ‘It appears we’re under a DDOS attack. We’re investigating and working on getting the site back online as quickly as we can’. Luckily, the security team behind the company managed to quickly mitigate the attack, and restore service.

However, it is believed that the attack was in fact a stress test, meant to differently target the attack next time, or even force the exchange to make a security mistake. This strategy has been put to use before, so Poloniex will have to be particularly careful in the near future.

For those who do not know, Poloniex can be considered one of the best altcoin exchanges, as it works hard to introduce as many coins as possible, while also keeping the services up and running at all times. In our review of the exchange, The Merkle also noted its friendly customer support, trading fee structure and more.

Based on everything that has been outlined so far, what do you think about the DDoS attack carried out on Poloniex? Was it the full attack, or just a simple stress test? Let us know your thoughts in the comment section below.