Get In Touch
It's never too early to prepare when you're a retailer gearing up for the holiday rush, especially with the continued growth in online commerce. Now is usually the time that shoppers begin making their shopping plans, and even start to make purchases. To help prepare, we've pulled together three essential elements for providing an exceptional customer experience during the holidays, and ultimately converting shoppers into buyers!
By Bill Brenner, Akamai SIRT Senior Tech Writer Akamai released a new whitepaper today about a spambot investigation conducted by Chad Seaman, a Senior Security Response Engineer from Akamai's Security Intelligence Research Team (SIRT). Attackers are using a multi-layered, decentralized and widely distributed botnet to launch coordinated brute-force spamming campaigns. Chad named it the "Torte" botnet because its structure resembles a multi-layered cake. The botnet is fairly large and
With the holiday season quickly approaching, retailers are thinking through every element of their company's eCommerce plans to significantly boost sales during the busiest shopping time of the year. One of the biggest drivers of online retail sales is user experience, so retailers should place increased emphasis on bolstering the following customer touchpoints during the holiday rush to ensure positive brand interactions that convert browsing into sales:
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Response Team (SIRT) released a new advisory today about three new attack vectors digital miscreants have used to target Akamai customers. The main researchers for this advisory were Jose Arteaga and Wilber Mejia.In the third quarter of 2015, Akamai mitigated and analyzed the following vectors:NetBIOS name server reflection DDoSRPC portmap reflection DDoS Sentinel reflection DDoS, which reflects off of licensing
Researchers have released details of a tool that allows users to discover origin servers. Researchers call it Cloudpiercer, which uses a number of techniques to locate origin servers' IP addresses. The Cloudpiercer tool bundles several previously known methods with some stated new ones to simplify the reconnaissance against targets. It's a reconnaissance tool, not an attack tool. A potential attacker may use similar methods to search for a customer's datacenter
It seems like holiday promotions have already started for many retailers and the promotion timetables are even earlier than last year. On a recent trip through my local big box retailer I noticed that Christmas decorations are already out, just one aisle down from the Halloween decorations.
A pharmaceutical company decides to go global for a lot of reasons: Perhaps they want to expand into developing markets that are less saturated. Or they may need to conduct global clinical trials to get broader and more diverse participant base.
On September 16, 2015 the Securities Industry and Financial Markets Association (SIFMA) conducted Quantum Dawn 3, the third in a series of cyber attack exercises against the capital markets industry. Over 650 people from more than 80 firms and government agencies participated in the exercise. And this year, for the first time, Akamai was invited to take part.
By Bill Brenner, Akamai SIRT Senior Tech WriterAkamai's Security Intelligence Response Team (SIRT) is tracking XOR DDoS, a Trojan malware attackers are using to hijack Linux machines to include within a botnet for distributed denial of service (DDoS) campaigns. To date, the bandwidth of DDoS attacks coming from the XOR DDoS botnet has ranged from a few gigabits per second (Gbps) to 150+ Gbps. The gaming sector is the primary