Akamai Diversity

The Akamai Blog

Akamai and Quantum Dawn 3 - That's a Wrap!

On September 16, 2015 the Securities Industry and Financial Markets Association (SIFMAconducted Quantum Dawn 3, the third in a series of cyber attack exercises against the capital markets industry.  Over 650 people from more than 80 firms and government agencies participated in the exercise.  And this year, for the first time, Akamai was invited to take part.

Ghosts Haunt Internet II: Android Malware

<p>Android fans were probably chuckling over the XcodeGhost malware news - hackers don't often penetrate Apple's defenses. This provoked the Nominum, now part of Akamai, Data Science team to take a look at what's happening with malware targeting Android. Common wisdom is Android is exposed because there's less rigor in the development and supply chain, and third-party app stores with no protections are popular. Determined hackers can allegedly subvert defenses and get various kinds of exploits placed on mobile devices running the highly popular operating system. But what does the data show?</p>

Akamai at Velocity New York - See You at Kiosk #22!

We're counting down the days to Velocity New York (October 12-14) where Akamai will join web performance and DevOps experts from some of the most innovative companies in the world. Come by kiosk #22 to see the Akamai team and get a preview version of our upcoming High Performance Images O'Reilly book or see how we can help your site achieve peak performance.
The calendar may read September but for the retail industry, it's time to start preparing for holiday season, as traffic volumes to their websites and apps will start to increase. While increase in traffic volumes can certainly correlate to positive impact in sales, surges in activity can also result in downtime, if retailers are not ready for it.

Bringing the Akamai CDN to Microsoft Azure Customers

While this year's Super Bowl XLIX pitted two powerhouse teams from Seattle and Boston squarely against one another, behind the scenes two other notable Seattle and Boston organizations worked closely to help ensure viewers could enjoy the game live online. The Super Bowl is just one of many of the major online events upon which 

Microsoft and Akamai have collaborated, with others including the Sochi Winter Olympics and Brazil World Cup.

XOR DDoS Threat Advisory

By Bill Brenner, Akamai SIRT Senior Tech Writer

Akamai's Security Intelligence Response Team (SIRT) is tracking XOR DDoS, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns. To date, the bandwidth of DDoS attacks coming from the XOR DDoS botnet has ranged from a few gigabits per second (Gbps) to 150+ Gbps. The gaming sector is the primary target, followed by educational institutions. Akamai SIRT released a threat advisory this morning authored by Security Response Engineer Tsvetelin "Vincent" Choranov.

Akamai, iOS 9 and App Transport Security (ATS)

For app developers who use or are looking to use Akamai application acceleration services, we've provided the following information to help you understand how our services comply with Apple iOS 9 App Transport Security (ATS) requirements. 

Helpful Links:

Security Kahuna Podcast, Sept. 2015

In this episode, Bill Brenner, Martin McKeay and Dave Lewis discuss DEF CON 2015 in terms of content and substance. One of the hot-button topics discussed at DEF CON and other security events is the hacking of IOT devices, including smart cars, and the group analyzes the research necessary into possible vulnerabilities. The trio also discusses changes for the State of the Internet Security Report, beginning in Q3 2015, including reorganization of case studies and the inclusion of new data and new voices to represent different aspects of security.

XCodeGhost Haunts the 'Net

The DNS offers visibility into many kinds of Internet trends including various security threats. We've reported extensively on DNS DDoS and Nominum, now part of Akamai, Data Science also tracks botnet activity. In this case queries for Command and Control (C&C) domains for the recently disclosed XcodeGhost malware were observed in September. Infected development tools were reported to have been used for the popular iOS app WeChat.

Refining the State of the Internet Report

Over the last several years, many users have adopted mobile devices, including smartphones and tablets, as their primary means of accessing the Internet. A number of studies published over the past year illustrate this trend, especially among millennials. In addition, improvements to, and greater deployment of this technology by mobile network providers have led to mobile connection speeds that rival fixed broadband connections in some geographies.  LTE-Advanced, which is being rolled out by carriers in countries around the world, provides for download speeds in the hundreds of Mbps range, with the latest Android and Apple devices including support for LTE-Advanced.