Worldwide Server Sales Reach $50.9 Billion in 2014: Report

Posted by: Admin  :  Category: Web Hosting News

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

Worldwide server shipments and factory revenues increased in Q4 2014 on the strength of Chinese server investment which drove the Asia/Pacific revenue growth to a 15.8 percent jump, according to the latest IDC report.

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

The post Worldwide Server Sales Reach $ 50.9 Billion in 2014: Report appeared first on Web Hosting Talk.

Web Hosting Talk

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

KnownHost recognized by ReviewSignal for Best Managed VPS Host 2014

Posted by: Admin  :  Category: Web Hosting News

The post KnownHost recognized by ReviewSignal for Best Managed VPS Host 2014 appeared first on Web Hosting Talk.

Web Hosting Talk

The Great Hacking Heist of 2014

Posted by: Admin  :  Category: Web Hosting

2014 seemed to be the year of the hack and whittling away at website capabilities. While some hacks can serve as a mere annoyance to web hosts and their clients, others can be downright devastating for days to come. Such hacks can lead to the release of sensitive employee information and private correspondences, as was the case with the infamous Sony hack. Besides having to deal with the public, hacked companies also have to deal with the legal repercussions and potential damage to their reputation.

Just as there are hacker groups like Anonymous who use their hacking skills for good, there are those like Lizard Squad who use theirs for evil. What’s more is that some hackers aren’t above selling their skills for $ 6 a pop for an individual to unleash a DDoS attack on an unsuspecting website. As a web host and member of the IT community, you should make it a top priority to learn if your sites are vulnerable to online drive-by attacks and how you can defend yourself and your clients against them.

Marketing With Malice

Towards the end of 2014, a hacker group called Lizard Squad launched a DDoS attack against popular gaming services Xbox Live and the Playstation Network, leaving gamers and users in limbo when they attempted to sign on. Later the group admitted the attack was a type of twisted marketing campaign for a new service they were offering: the ability for anyone on the globe to launch an equally crippling DDoS attack of their own all for $ 6. For the price of a cup of Starbucks coffee someone could attack any website and knock it offline for 100 seconds. Pay $ 130 and the site would be down for eight hours.

The group got their comeuppance when they themselves were hacked and the names of their customers were released online. While the $ 6 hacking tool attracted more than roughly 14,200 individuals, only a few hundred of them actually paid for a DDoS attack of their very own. An excess 11,000 USD worth of Bitcoins were used to pay for the tool. Is it ironic that a group of hackers couldn’t keep the names of their customers safe or just plain lazy? In either case, take a lesson from Lizard Squad and make sure you take preventative and protective measures for DDoS attacks against your sites and web hosting services.

Let the Right One In 

There are several things you and your clients can do to protect yourselves against DDoS attacks. The very first thing you should do is learn how to identify when you may be under any kind of hack or attack. Quick action can save you and your clients a severe headache in the future. Express the importance to your clients of learning what their average inbound traffic is so they’ll be better able to identify when their website might be under attack. It’s also a good idea to have a designated individual to respond to such an attack should one ever occur.

It’s also a good idea for you to have more bandwidth than you absolutely need for your websites. Not only is the extra bandwidth good for mitigating the effects of a hacker attack, it’s also a good way to accommodate for an unexpected spike in genuine traffic. While over-provisioning a site by one-hundred percent or ever five-hundred percent won’t be enough to stop a DDoS attack completely, it can most certainly help give you time to formulate a plan of action rather than watch as the walls of your digital Jericho come tumbling down.

After you’ve done what you can to repair and prevent the damage done by an online attack, get in touch with your ISP. If your clients notice the attack before you do, make sure they call you ASAP. It’s best that you have the emergency contact information for your ISP kept close at hand so that you don’t have to waste time scrambling to find it and potentially getting in touch with the wrong department or individual. The great thing about having a web server in a hosting center is that there are more capacity routers and bandwidth links in addition to experienced individuals who know which steps to take during an attack or hack.

If the attack is major enough, it could require the focused expertise of a DDoS mitigation company. Such companies have the resources and expertise necessary to keep a website up and running during an attack. Learn more about these companies now and which are a good match for you and your web hosting needs in order that you can take action as quickly and efficiently as possible should your sites ever come under attack.

Going Mobile 

Besides focusing on protecting regular websites, web hosts should also make sure websites that are optimized for mobile use are prepared for DDoS attacks. It’s been reported that the newest countries that will start launching DDoS attacks are Vietnam, Indonesia and India. While these countries may not yet have the capabilities to launch an attack that measures up to Lizard Squad’s, they can most certainly focus their efforts on mobile phones. With more and more people doing business and using the internet on their phones, a mobile DDoS blow can still cost a business money both from lost revenue and the money it can take to remedy and respond to such an attack.

Specifically, IT managers and internet security teams will need to make sure they develop and implement measures for multi-vectors attacks in order to avoid outages instead of utilizing volumetric methods. They’ll also need to account for swelling packet volume that can potentially bleed out into their current DDoS protective measures.

Many companies and individuals have become so used to relying on a specific website throughout their day-to-day life that suddenly not having access to that website even for a few hours can completely ruin their day. For businesses, being offline can potentially cost them thousands of dollars if their website is their only means of receiving and fulfilling orders. Keep your IT eyes on the latest developments with DDoS attacks, the hacker groups who seem to be using them the most and the steps you can take to either prevent or properly respond to such an attack.

Top image ©GL Stock Images

Web Hosting Geeks’ Blog

2014 Hacker Attacks: There Were More Than You Know

Posted by: Admin  :  Category: Web Hosting

While the world was in an uproar about the alleged North Korea hack on Sony Pictures, many other organizations were compromised as a result of loopholes and deficiencies in their web security. Many of these attacks did not receive as much publicity as the North Korea and Sony Pictures fiasco did. Here is a brief look at some of the other cyber attacks that were going on around the same time.

Who Were the Biggest Hacks of 2014?


Rackspace was the victim of a several hour DDoS (Distributed Denial of Service) attack that left its DNS servers at their London, North Virginia, and Chicago data centers overwhelmed. Company engineers noticed that its DNS requests weren’t resolving at around 12:54 AM EST on December 22, 2014, as a result of the DNS attack. To fix the issue, Rackspace engineers began reducing the amount of services that were running on the affected servers which may have caused some of their legitimate traffic to be blocked.

Approximately 12 hours later, Rackspace had restored much of its DNS service, but not without complications. A small percentage of DNS services that were routing legitimate and DDoS traffic had been blacklisted, and the resolution required further investigation and tweaking by engineers. The complete breach was resolved later on that day.

To prevent further complications from this attack, Rackspace began implementing a Root Cause Analysis to gain better insight and information on what lead to the DDoS attack so they can take the necessary precautions to prevent this type of incident from happening again in the future.

ICANN Network

An unknown hacker used email spoofing to compromise ICANN (Internet Corporation for Assigned Names and Numbers) in November 2014. The hacker gained access to the company’s internal systems using the credentials of an employee. During the attack, emails were created to look as if they came from ICANN’s domain and sent out to other employees in the organization. The emails may have contained links to bogus websites, which encouraged employees to type in their security credentials, thus providing the hacker with access to their usernames, passwords and other types of confidential information.

Employee names, email addresses and other personal data are stored in ICANN’s Centralized Zone Data System (CZDS) and were compromised as a result of the breach. In addition to the CZDS being breached, ICANN’s blog, GAC Wiki, and WHOIS were all compromised as well.

To resolve the breach, ICANN disabled and reset all passwords and advised its employees to take extra precautions with other online accounts that they have used the same username and password for.

JP Morgan Chase

In what may be forever known as the attack that should have never happened, JP Morgan had to deal with the aftermath of a cyber-attack that reportedly affected at least 83 million of its customers and small business clients. Had JP Morgan implemented a security update to add a two-step authentication process to its servers, the security breach could have been prevented.

The bank states that this situation was very limited in its scope and the only information compromised was email passwords, addresses, and phone numbers. To determine the extent of the breach, JP Morgan is currently in the process of running an internal review to discover any other remaining and potential loopholes that could create security problems in the future. As of this moment, the origin of the attack is not known.

PlayStation Network and Xbox Live

On December 7th, 2014, PSN servers were down. Hacker group Lizard Squad informed the world on Twitter that it was responsible for the attack on PlayStation Network. While Lizard Squad is known for using DDoS attacks on their targets, officials at Sony are not sure if the attack is DDoS in nature. The PlayStation Network was previously taken offline back in August 2014 by the same group. Lizard Squad is also claiming responsibility for the attack that left Xbox Live servers down for several hours on December 1, December 5, and again on December 25, 2014.

PSN’s attack comes right on the heels of a previous attack on Sony in which a large amount of private company information was exposed to the public, via the internet. At the current time, not much information is available on how the attacks were resolved, but both PlayStation Network and Xbox Live Networks are up and running.

Challenges These Companies Face

Security breaches and cyber attacks are on the rise. While no company is completely safe, large companies are far more likely to be compromised because they have access to more sensitive data that hackers want. Large companies are experiencing an increasing number of security breaches and are often left scrambling in embarrassment to clean up the mess that these breaches create.

Some of the most world’s popular companies such as JP Morgan Chase, ICANN and Xbox are not quite prepared for the methods that hackers use to infiltrate their systems. While careful consideration must be given to each organization’s infrastructure, it is apparent that drastic and revolutionary security measures need to be taken sooner than later. As companies resort to adding more software and technology into their infrastructures, more effort needs to be given to identifying the vulnerabilities that software and technology create.

Evolution of Cyber-Attacks

The face of cyber-attacks has evolved. Now hackers use many different tactics including spear-phishing, DDoS, USB devices and other fraudulent methods to compromise some of the world largest and most well-known organizations. These attacks don’t happen all at once; instead they happen persistently. Once hackers gain access to a system, they lurk and systematically steal information for extended periods of time. In many cases, an organization can be compromised using an employee’s credentials while the employee and the company remain unaware of the breach.

There is a problem with the way that organizations are dealing with these attacks. Companies are scrambling and playing catch up when hackers are steadily evolving their tactics to remain ahead of the game. A deeper look needs to be given to software and security protocol to determine where the risks exist so that solutions can be created to get rid of the loopholes. Organizations should invest more of their resources to implement a host of security strategies and measures to protect its vulnerabilities and its customers.

Top image ©GL Stock Images

Web Hosting Geeks’ Blog

Huawei Sales Rise 15 Percent in 2014, Ending Year at $46B

Posted by: Admin  :  Category: Web Hosting News

Huawei, a Chinese provider of equipment and services for networking and telecoms, has ended 2014 with a 15 percent rise in sales revenue, surpassing its 11.6 percent growth in 2013, according to a New Year’s message from Ken Hu, the current Huawei CEO among its three rotating CEOs.

The post Huawei Sales Rise 15 Percent in 2014, Ending Year at $ 46B appeared first on Web Hosting Talk.

Web Hosting Talk

Hosting Trends That Changed Small Business in 2014

Posted by: Admin  :  Category: Web Hosting News

At GoDaddy, we’ve been keeping a close eye on the way that small businesses have taken advantage of all that the Internet offers, expanding their services and sales opportunities beyond the traditional brick and mortar. So what are some of the biggest trends that impacted small businesses this year, and how will they grow in 2015?

The post Hosting Trends That Changed Small Business in 2014 appeared first on Web Hosting Talk.

Web Hosting Talk