Top of Page
In this report, we present survey results and background information on the attackers behind the PlugX malware used in targeted attacks. We also examine recent trends in DDoS attacks and their countermeasures, and discuss the Workshop on the Appropriate Way to Handle Cyber Attacks in the Telecommunications Business of the Ministry of Internal Affairs and Communications.
In this volume we report on analysis results incorporating the 52 weeks’worth of data from week 14 of 2013 to week 13 of 2014, while referencing data from IIR Vol.1.
In our discussion of email technology, we also report on changes to the SPF sender authentication technology.
In this report we discuss the current state of big data, which is estimated to already exist in the exabyte range.
We also examine trends in analysis platform technology, and look at changes in the analysis of big data that accompany the shift to real-time solutions.
End of the page.