Get In Touch
Akamai Security Researcher Or Katz was recently published at InfoSecurity talking about how to defend against web application account takeovers with cloud security intelligence.
One of the most common complaints on the Akamai Community is from people who are browsing the web from IP addresses that Akamai has seen performing malicious activity. Depending on the severity and number of these malicious activities, Akamai assigns the IP address a rating that predicts the likelihood that the IP will perform a malicious act in the future. These ratings come from our Client Reputation module, a module
Akamai's next "Girls Who Code" summer immersion program is still a couple of months away, but in the meantime I wanted to tell you about our involvement with another fantastic organization inspiring girls to pursue tech careers - the Girl Scouts.
By Bill Brenner, Akamai SIRT Senior Tech Writer Operation Killing Bay, better known as #OpKillingBay on social media sites, is expanding. Historically, malicious attackers participating in OpKillingBay have targeted Japanese government websites and sites of companies participating in whale and dolphin hunting. These attackers often see themselves as protesters or activists, in addition to hackers and refer to themselves as "hacktivists."
When Let's Encrypt was founded at the end of 2014 it had a lofty goal: promote the use of TLS everywhere by making certificates free and server configuration painless. It was noted that for many web administrators, for both large and small sites, TLS was seen as expensive, difficult to configure, and slow. With that headwind, the return on investment was seen as too low to bother unless you were
Since showcasing a production demonstration of HTTP/2 at Velocity in 2014 and announcing broad support in 2015, Akamai has been actively working with hundreds of customers to deliver HTTP/2-enabled websites.
In the last year or so I've been looking at Wordpress plugins. I've seen some poorly written code, plugins that had little purpose (one plugin's stated purpose was to only download a copy of itself!) and patches that attempted to fix a problem but weren't thorough enough or didn't follow the official Wordpress recommendations and codex. Bad code can not only be a threat to the system it's hosted on
HTTP Strict Transport Security (known as HSTS for short) is a security signal that instructs the browser to attempt all requests to your website using HTTPS. In short, with HSTS enabled, a modern browser will never attempt to visit your site on HTTP. Furthermore, the browser remembers this instruction for an amount of time you set. So the next time a user visits your website, their browser won't attempt a
By Bill Brenner, Akamai SIRT Senior Tech Writer Akamai's Security Intelligence Research Team (SIRT) continues to see the BillGates trojan/bot family of malware being used to launch DDoS attacks. Attackers who control the malware -- first disclosed on a Russian IT website in February 2014 -- can gain full control of infected systems. Akamai SIRT member Tsvetelin Choranov led the research effort outlined in this advisory.