Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/19/2013
11:47 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prolexic Shares Best Practices for Protecting E-Commerce Sites Against Q4 DDoS Attacks

White paper addresses escalating cyberthreats targeting e-commerce sites

HOLLYWOOD, FL – (September 19, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a number of best practices that firms operating e-Commerce websites can implement to reduce the impact of cyber attacks.

In a new Executive Series white paper, "Safeguarding e-Commerce Revenues from DDoS Attacks in Q4," Prolexic advises online retailers to be on high alert for DDoS attacks in Q4. Extended site downtime and the resulting inability to make sales and process online orders during the holiday shopping period, including Black Friday and Cyber Monday, can significantly jeopardize Q4 revenues for e-tailers.

Prolexic expects DDoS attacks against e-Commerce sites to increase in size and intensity this fourth quarter, based on previous attack events noted in the company's "Q4 2012 Quarterly Global DDoS Attack Report." In Q4 last year, the most active quarter of the year, Prolexic mitigated attacks that reached more than 50 Gbps directed against clients in e-Commerce, financial services and SaaS markets. The average attack duration was 32.2 hours, a crippling duration in e-Commerce.

"Past experience shows that online retailers must take seriously the increased threat of DDoS and other cyber-attacks during the holiday shopping season," said Stuart Scholly, president of Prolexic. "Online shoppers have many options, and if they can't readily conduct business with you, they will quickly turn to competitors instead. This white paper offers insight about the current DDoS threat landscape and provides a clear blueprint for building a stronger DDoS defense, so you can avoid downtime and support sales."

This executive series white paper addresses the escalating cyber threats targeting e-Commerce sites and recommends best practices for protecting online retailers against loss of sales and revenue, damaged brand reputation, and reduced customer confidence due to DDoS. Prolexic also reveals key warning signs that a website could be targeted for a denial of service attack and concludes with best practice recommendations for making DDoS mitigation a part of a disaster recovery plan. The white paper is available to the public at www.prolexic.com/safeguarding.

The white paper also provides a link to PLXplanner, Prolexic's free, online DDoS protection and planning tool. PLXplanner helps e-Commerce sites understand their vulnerabilities for a denial of service attack, as well as provides recommendations on how to strengthen their DDoS defense. PLXplanner is available at www.prolexic.com/plxplanner.

About Prolexic

Prolexic Technologies is the world's largest, most trusted Distributed Denial of Service (DDoS) protection and mitigation service provider. Able to absorb the largest and most complex DDoS attacks ever launched, Prolexic protects and restores within minutes mission-critical Internet-facing infrastructures for global enterprises and government agencies. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel, hospitality, gaming and other industries at risk for DDoS attacks rely on Prolexic for DDoS protection. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida, and has DDoS scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit prolexic.com, and follow us on LinkedIn, Facebook, Google+ and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.