Watch International Cyber Attacks Take Place in Real Time
July 27, 2015 - 2 minutes readSecurity issues have become a hot-button topic for Toronto iPhone app developers and software developers around the world. With cyber crime and hack attacks continuing to make headlines, several new websites that claim to track hacking activity in real time have cropped up. These sites feature maps that show both the targets and the sources of hack attacks around the globe. In particular, four such sites have been generating a great deal of buzz within the tech and cyber security industries:
- Norse Attack Map: Run by the renowned Internet security company Norse, the Norse Attack Map claims to offer a real-time view of active hacking attempts around the world, showing the country in which the attacks are originating and the country the attacks are targeting. What the hackers don’t know is that they’re falling into traps laid by Norse; the company uses something called “honey pots” to entice hackers into coming after intentionally created vulnerabilities so their activities can be detected.
- Digital Attack Map: A partnered effort between Arbor Networks and Google, the Digital Attack Map tracks DDoS threats in real time.
- Kaspersky Cyberthreat Real-Time Map: Kaspersky is well-known in the tech industry for its high-quality antivirus software, and the company has entered the sphere or real-time cyber threat tracking. Its real-time map focuses on malicious software intrusions, which are stripped of all personal or identifying data and uploaded anonymously to the map.
- FireEye Cyber Threat Map: While the FireEye Cyber Threat Map doesn’t technically operate in real time, it does generate a very interesting picture of how surreptitiously installed malware communicates with the server systems that are remotely controlling the malicious software.
Of course, it’s worth noting that all four sites are partially or fully operated by cyber security industry vendors. Even so, they provide Internet of ThingsĀ app developers around the world with valuable insights into the continually evolving nature of cyber threats.
Tags: anonymous attack, anonymous ddos, anonymous hack, anonymous hackers, anonymous threat, antivirus software, Arbor Networks, cyber crime, cyber-security, ddos attack map, ddos attacks, ddos defense, ddos hack, DDoS threats, Digital Attack Map, FireEye, FireEye Cyber Security, FireEye Cyber Threat Map, FireEye IT security, google cyber security, google gets hacked, google hack attack, google hacking, google it security, google vulnerabilities, hack attacks, hacking vulnerabilities, honey pots, intentionally created vulnerabilities, internet of things hack, iot hack attack, iot hack threat, iot threat, Kaspersky, Kaspersky Cyberthreat, Kaspersky Cyberthreat Real-Time Map, Kaspersky it security, malicious software, malicious software intrusions, malware, malware communications, Norse Attack Map, Norse security, personal or identifying data, real time, real time map, real time mapping, software developers, track hacking activity