The DDoS (Distributed Denial-of-Service) occurrences are in everyone’s mind! Over the last few years, there has been an increase both in terms of number of attacks and scale of the attacks. Typically, a DDoS attacks consists in overwhelming a server by a number of requests it cannot handle. To complete a DDoS attack, hackers use relays: they take control of easy targets and use these targets to trigger the attack on the server itself.
According to the Identity Theft Resource Center, 900 major data breaches were recorded worldwide in 2016, up from 783 in 2014. In the hyper connected world, this is not really a surprise!
LoRa (Long Range Radio Wide Area Network), Sigfox, NB-IoT, LTE-M, … are acronyms that come often in exchanges about IoT projects. Other networks such as Wi-Fi, Bluetooth or Zigbee are also used for IoT projects, along with traditional mobile communication networks, GPRS, 3G, 4G and soon 5G.
About this blog…