Can't see content of this e-mail? Click here for browser version.
Volume 1
In The News

DDoS attacks on the domain name system have grown over 200% in the last three years. Yet, despite this rise, many businesses still aren’t doing enough to secure a critical component of their IT infrastructure.  A recent survey on infrastructure security found that more than 25% of companies had not established formal responsibility for DNS security. The reaction of both the media and consumers to the high-profile attacks witnessed in 2014, such as those on Target and JP Morgan, has shown companies will not be easily forgiven when a hack occurs – especially if certain security measures could have prevented the attack. With the ever-increasing rise in distributed denial of service (DDoS) attacks on DNS, companies not taking measures to secure their DNS can appear negligent.  >> Read more

Hong Kong websites supporting pro-democracy protesters have been hitting with a series of cyber attacks that is described to be the largest in the history.  The powerful clash in Occupy Central protests in Hong Kong are not just happening in the streets but on the web too. Over the last few months, the said largest cyber attack ever recorded has been made against the two independent news media sites in Hong Kong, which have been covering the protests. The websites, Pop Vote and Apple Daily have been the vocal supporters of pro-democracy protests, which carried out mock chief executive elections for Hong Kong. Cloudflare, which protects the two websites against the denial of the service attack, has exposed that ever since June, these websites have been attacked with junk traffic at notably 500 gigabits per second.  >> Read more

DDoS attacks are on the rise and growing more complex. A majority of respondents in a recent survey from Neustar indicate a service outage would cost their companies $10,000 or more per hour in lost revenues.
>> Read more

As a leading provider of Cloud Hosting, Colocation and Managed solutions, security is always at the forefront of what we do. Security threats are evolving, not only in frequency but also sophistication. Webair offers a comprehensive suite of Managed Security solutions to protect your business against malicious assaults on critical systems, applications and infrastructure, including Managed Firewalls, to DDoS Mitigation.
Webair’s security specialists can help deploy the appropriate solution for our clients. Once in place, our network security team monitors and manages your environment 24x7x365, providing immediate response and fast resolution to security breaches. Webair’s approach to DDoS attacks include: proxy-based mitigation, where we direct all incoming traffic to a proxy server on our DDoS-protect network, then forward clean traffic to your server, and volumetric mitigation, where we filter harmful traffic in our cloud before it reaches your network.

We provide our clients with centralized monitoring, DDoS-specific alerting, logging and reporting systems, as well as access to experienced DDoS mitigation professionals. Because Webair has 24x7x365 operation, our security stance is “always-on”. From that standpoint we are able to provide a higher degree of protection, as well as fast response time to issues from DDoS and mitigation abilities to having the latest patches for any discovered vulnerabilities.

A critical vulnerability in the operating system Linux has been discovered, which allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.  The vulnerability is the Linux GNU C Library (glibc) and is known as GHOST, because it can be triggered by the gethostbyname functions. It impacts many systems built on Linux starting with glibc-2.2 released on November 10, 2000. 
>> Read more

Linux “GHOST” is a remote code execution vulnerability in the glibc. This is a buffer overflow vulnerability that affects the gethostbyname functions used to resolve host names in glibc. Glibc resolves domain names into IP addresses by applications. Similar to the Shellshock Bash vulnerability, any application that uses the affected functions in vulnerable version of glibc (practically any application that goes online) is at risk of being exploited.

Even though GHOST affects many systems, it is much more difficult to exploit than similar vulnerabilities. To successfully exploit GHOST, targets a specific application that uses the vulnerable functions in a manner that allows the attacker to control the parameters. Security experts say it will probably not be as widely exploited as Heartbleed or Shellshock due to the specificity of the parameters needed to successfully gain code execution. Red Hat, Debian, Ubuntu, and Novell have all issued patches.

Webair has an automation system in place that allows us to easily scan all customer managed servers to know what version of every important piece of software they're running. This data is then stored in a database so when vulnerabilities come up, we can instantly know what servers are affected. Once we know, we can automatically patch servers remotely using the same management layer. 

Follow us:


Phone: 516-938-4100 /