Akamai Diversity

The Akamai Blog

Yohai Einav

Yohai Einav

June 22, 2016 1:28 PM

Locky is Back

When we published our recent Locky blog post, we didn't expect it to have such a quick effect: a day after the post went online, this notorious ransomware went offline. We immediately figured it out - a blog post can change the world.

Bruce Van Nice

Bruce Van Nice

June 20, 2016 1:38 PM

Predicting Dynamic Malware Threats

We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt.

Yohai Einav

Yohai Einav

June 2, 2016 1:48 PM

Unlocking Locky

Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to

Sandy Wilbourn

Sandy Wilbourn

May 19, 2016 11:39 AM

Cross-organizational Use Cases Show Value of DNS in ...

There's been a lot of buzz about digital transformation. For me, the transformation is really about service providers delighting their customers. The other day I was speaking with a provider in EMEA that recently did a pilot with our Reach subscriber communications solution to up-sell higher data usage options to subscribers who are at 80% of bandwidth. We see this use case every day, especially as video streaming usage is

Anand Parikh

Anand Parikh

March 14, 2016 9:15 AM

CORD - An Interesting Use Case for Virtualized Aura ...

One of the important, and more interesting, use cases of Network Function Virtualization (NFV) and Software Defined Networking (SDN) is CORD. CORD stands for Central Office Re-architected as Datacenter. It "combines NFV, SDN, and the elasticity of commodity clouds to bring datacenter economics and cloud agility to the Telco Central Office" according to the CORD website. It is an initiative that was started by AT&T and Open Networking Lab (ON.Lab)

Hongliang Liu

Hongliang Liu

September 30, 2015 1:58 PM

Ghosts Haunt Internet II: Android Malware

<p>Android fans were probably chuckling over the XcodeGhost malware news - hackers don't often penetrate Apple's defenses. This provoked the Nominum, now part of Akamai, Data Science team to take a look at what's happening with malware targeting Android. Common wisdom is Android is exposed because there's less rigor in the development and supply chain, and third-party app stores with no protections are popular. Determined hackers can allegedly subvert defenses

Hongliang Liu

Hongliang Liu

September 23, 2015 1:27 PM

XCodeGhost Haunts the 'Net

The DNS offers visibility into many kinds of Internet trends including various security threats. We've reported extensively on DNS DDoS and Nominum, now part of Akamai, Data Science also tracks botnet activity. In this case queries for Command and Control (C&C) domains for the recently disclosed XcodeGhost malware were observed in September. Infected development tools were reported to have been used for the popular iOS app WeChat.

Jonathan Zarkower

Jonathan Zarkower

August 27, 2015 11:37 AM

Akamai Assists ISPs in Providing a Family-Friendly I ...

Family and Internet safety advocates have lobbied long and hard to government regulators and Internet service and content providers for stronger measures and controls over the types of content viewable by children when online. And based on recent reports, some ISPs have responded in a favorable way, by implementing services that place automatic blocks on "high risk" websites including those that feature nudity or sexual content or are related

Jonathan Zarkower

Jonathan Zarkower

August 20, 2015 10:35 AM

End-User Mapping Brings Users Closer to Internet Nir ...

It goes without saying that people enjoy using the Internet more when response times are fastest. But most of us are not as concerned about why websites respond more quickly, as long as they do. There are many factors that contribute to faster (and more satisfying) web experiences. Certainly, faster broadband connectivity and well-designed web sites play a role. And websites that leverage content delivery networks (CDNs), which distribute