Candid Wueest

Learn More
Distributed denial-of-service (DDoS) attacks, as the name implies, attempt to deny a service to legitimate users by overwhelming the target with activity. The most common method is a network traffic flood DDoS attack against Web servers, where distributed means that multiple sources attack the same target at the same time. These attacks are often conducted(More)
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry... The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by(More)
  • 1