• How to Stop Bots from Exploiting Social Media Sites

    Thad Dupper CEO Secure64 As I read the daily news about how “bad actors” have abused and exploited social media sites, flooding them with fake posts, I think back to a line from the classic movie Rudy. Leading up to the last game of the season, Coach Dan Devine (Chelcie…

    Read More
    0 2352
  • Not Vulnerable – Intel Itanium/Secure64 SourceT

    Intel Itanium and Secure64 Source T are NOT vulnerable to either Spectre or Meltdown and below are explanations of how both vulnerabilities work, and why Itanium and SourceT are immune. by John Worley, Director of Engineering, Secure64 The newly announced vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) code named Spectre and Meltdown have…

    Read More
    0 4512
  • Internet of Things – just because we can, doesn’t mean we should

      At the dentist office today was the most ridiculous thing to join the Internet of Things – a Bluetooth-enabled POWER TOOTHBRUSH.  What on earth is the value of connecting your toothbrush to the internet? For that matter, why enable your TOASTER to be online?  Your washer, your dryer?  Do…

    Read More
    0 2719
  • Avoid the DNS outage that could cost you the C-suite

    By Steve Goodbarn Co-founder and Chairman, Secure64 Summary of article published in The Business Journals. To read the article in its entirety, click here:  A DNS outage will take your business offline – and potentially your job with it.  It is time to make DNS security a critical focus point…

    Read More
    0 2762
  • Please build securely – before robots kill us

    Over the past couple of weeks, the world has been given WannaCry, which moved like wildfire through the globe and has given rise to multiple theories of origination from North Korea and not North Korea, and was dubbed “a pretty shoddy piece of work”.  As of this writing no one…

    Read More
    0 3167
  • The Front Door is well protected against DNS DDoS attacks, but what about the back?

    The DNS is the phone book of the internet, and most IP services are entirely dependent on its stability and performance. With the recent rash of DNS DDoS attacks, it has become clear that the DNS needs a special security status. DNS essentially remains a single point of attack, even…

    Read More
    0 3350
  • Dyn, BIND and DNS Strategy

    by SECURE64 on NOVEMBER 4, 2016 · · On October 21, 2016, leading websites including Twitter, Netflix and Spotify were severely interrupted by an attack on DNS hosting provider Dyn.  Many service providers experienced degradation in their DNS services because attempts to access popular web sites resulted in a SERVfail…

    Read More
    0 3519
  • Blocking Attacks from the Incredibly Insecure Internet of Things (IIIoT)

    by THERESA DEGROOTE on OCTOBER 26, 2016 In the wake of the massive attack against DNS provider Dyn, we as a security industry need to ask ourselves “what the hell are we going to do about the usage of dumb, secure-less IOT devices to become a bot army?” In the…

    Read More
    0 3163
  • DNS Hosting – the problem with centralization

    Recently, Robert Reich argued that the centralization of DNS on the “platforms of giants” has led to the vulnerability of the internet, as witnessed by the massive assault on DNS provider Dyn.  Last Friday’s attack led to problems accessing popular sites, including Twitter, Reddit, PayPal, and Netflix, and has left…

    Read More
    0 3511
  • Performing a signing algorithm rollover is not for the faint of heart

    We are proud of our DNSSEC heritage here at Secure64. We launched the first fully automated DNSSEC signing appliance in 2008, just weeks after security researcher Dan Kaminsky made public the flaws in the DNS protocol that DNSSEC addresses. Our goal from the very beginning was to make deploying DNSSEC…

    Read More
    0 3265