Akamai Diversity

The Akamai Blog

Rich Bolstridge

Rich Bolstridge

October 31, 2016 9:34 AM

Dyn DDoS Attack: Wide-Spread Impact Across the Finan ...

The recent DDoS attack against the Dyn DNS service resulted in major impact across the financial services industry, and provides us an example to better understand the technology risks and the lessons learned from this attack. In the first of this two part blog, we will examine the impact that the attack had on banks, insurance companies, and other firms in the industry. In Part 2, we'll dig into some

Craig Sprosts

Craig Sprosts

October 24, 2016 11:57 AM

What CSPs Can Learn from the Latest DDoS Attacks

On Friday, October 21, 2016, there was a major distributed denial of service (DDoS) attack that took down major U.S. company websites, including Twitter, Paypal, The New York Times, Box, Netflix and more. The attack targeted managed DNS provider Dyn Inc., which hosts the authoritative DNS for these popular domains. The attack originated from a large number of compromised IoT devices, including internet-connected cameras, routers and digital video recorders.

Yohai Einav

Yohai Einav

October 11, 2016 3:45 PM

Examining the Long-Tail of DNS Queries: A Hotbed of ...

Data scientists put in a tireless amount of work tracking cybercriminals--from specific individuals to entire organizations--looking at their behavior and the methods through which they attempt to compromise data. Because DNS is a ubiquitous protocol that's used for most internet interactions, it also provides fertile ground for cybercriminals to launch malware. Nominum, now part of Akamai, Data Science examines massive volumes of DNS data--100 billion queries daily--to detect anomalies and

Akamai

Akamai

October 11, 2016 12:12 PM

2 Ways an Entire Country Can Lose Access to the Inte ...

For citizens of the most advanced economies, it is hard to conceptualize what being entirely cut off from the Internet would look like, let alone how it could actually happen. Is it as simple as flipping a kill switch or pressing an 'Off' button? Though unlikely in countries like the United States that have numerous independently operated providers and redundant Internet infrastructure, total shutdowns are still possible in geographies where

Yohai Einav

Yohai Einav

July 7, 2016 1:20 PM

Preventing the Necurs Bot from Phoning Home

This story has been told thousands of times before - a botnet is born, a botnet goes down, a botnet tries to get its bots back together. But the story of Necurs is unique.

John Arledge

John Arledge

June 23, 2016 12:03 PM

What's in a Name? Leveraging DNS to Personalize Serv ...

In his latest white paper, "Innovation in Communication Services: Breaking with the Past without Waiting for the Future," Patrick Donegan of Heavy Reading discusses a key aspect of digital transformation: the ability to offer innovative services that enhance the subscriber experience. More specifically, he discusses the need for personalized services--as well as why DNS technology is an ideal way to achieve personalization in new service offerings.

Yohai Einav

Yohai Einav

June 22, 2016 1:28 PM

Locky is Back

When we published our recent Locky blog post, we didn't expect it to have such a quick effect: a day after the post went online, this notorious ransomware went offline. We immediately figured it out - a blog post can change the world.

Bruce Van Nice

Bruce Van Nice

June 20, 2016 1:38 PM

Predicting Dynamic Malware Threats

We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt.

Yohai Einav

Yohai Einav

June 2, 2016 1:48 PM

Unlocking Locky

Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to