5 Signs Your Smartphone Has Been Hacked

As mobile devices continue to dominate our choice for Internet access, a significant increase in smartphone and tablet malware is inevitable.  Along with this will come hijackings and botnet farming.

http://www.darkreading.com/endpoint/5-signs-your-smartphone-has-been-hacked/d/d-id/1327326

20 Endpoint Security Questions You Never Thought to Ask

IT Security professionals, network engineers and admins are looking for ways to tighten and strengthen every layer of the network to defend against threats.  The end point has become ground zero for a variety of attacks, so as such the end point management, monitoring and control sector has experienced tremendous growth.  These are some good questions to consider when evaluating products and developing a strategy.

http://www.darkreading.com/endpoint/20-endpoint-security-questions-you-never-thought-to-ask-/a/d-id/1327305

Lawmakers Asking What ISPs Can Do About DDoS Attacks

This is an intriguing step by Senator Warner, and it poses several follow up questions.  I am personally unsure how an ISP can govern the devices on the inside of any user’s home router or firewall.  Obviously, from a technical perspective, certain outbound traffic from a home can be filtered, but it would be very difficult to determine the configuration or firmware version of the source device.

ISP’s, however, are capable of assisting in the fight against DOS and DDOS attacks, depending on the architecture of their infrastructure and the investments they are willing to make to build dynamic solutions for routing and “blackholing” malicious traffic.

I am glad to see this debate coming to the forefront and receiving some well-deserved attention.  The answers, however, are not quite as clear as we would like them to be.

https://threatpost.com/lawmakers-asking-what-isps-can-do-about-ddos-attacks/121557/