Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

June 9, 2014 4:30 AM

Fresh Wave of Online Extortion Attacks Underway

Akamai CSIRT has identified a trend in online extortion that has the potential to impact customer websites and their users. Attackers are using reflected UDP to launch direct-to-origin denial of service attacks at e-commerce sites, then demanding payment to stop the attacks, CSIRT's Mike Kun wrote in an advisory. "We have seen these extortion attempts target e-commerce and retail sites, as well as online collaboration sites, but all sectors are

Andy Ellis

Andy Ellis

June 5, 2014 1:09 PM

OpenSSL vulnerability (CVE-2014-0224)

The OpenSSL Project today disclosed new vulnerabilities in the widely-used OpenSSL library. These are vulnerabilities that can potentially impact OpenSSL clients and servers worldwide. The most interesting is the ChangeCipherSpec Injection, which would enable a man-in-the-middle attack to force weaker ciphers into a communication stream. Akamai SSL services (both Secure Content Delivery and Secure Object Delivery) have been patched for this vulnerability. The other vulnerabilities are relatively uninteresting for our

Bill Brenner

Bill Brenner

June 5, 2014 6:06 AM

Build Systems to Fail

Akamai Security Advocate Dave Lewis (@gattaca on Twitter) has written a new post for Forbes. He argues that we need to assume that our systems will fail and fail hard. "We need to build network security with failure in mind," he wrote. "There was once a notion of 'bricks and clicks' that was meant to demonstrate a delineation between retail and online presence. This too has fallen by the wayside as

Bill Brenner

Bill Brenner

June 4, 2014 7:03 AM

A Year in the InfoSec Life: 5 Lessons

Yesterday was my one-year anniversary at Akamai, and it's been a great learning experience. To measure the journey, I took a look at posts written in the past year. The following compilation captures the lessons that have made the biggest impression so far.

Bill Brenner

Bill Brenner

June 3, 2014 6:48 AM

5 Security Headlines

A look at the security issues making headlines so far this week: Phishing campaign touts fake 'Heartbleed removal' tool (Computerworld) The program attached to the emails is actually a keylogger, according to Trend Micro. Iranian Cyberspies Pose as Journalists Online To Ensnare Their Targets (Dark Reading) Cyberspying campaign out of Iran combines social engineering and social media to steal credentials from a wide array of US and Israeli military, government,

Bill Brenner

Bill Brenner

June 2, 2014 4:54 AM

Headed To Black Hat, DEF CON and BSidesLV?

Though it's still two months away, this is the time of year when those headed to Black Hat, DEF CON and BSidesLV start fretting over registration, flights and hotel bookings. This year I decided to get a jump on things, and here are a few things I've learned that will hopefully make your lives easier.Akamai security staff will be there in force, and we're certainly looking forward to it.

Bill Brenner

Bill Brenner

May 30, 2014 8:59 AM

What's Your Favorite Security Conference?

I've been participating in an ongoing, online panel hosted by the Information Security Buzz website. The latest question is, "Based on your experience and knowledge, what would you say is the BEST Information Security event to attend and why?"

Akamai

Akamai

May 29, 2014 3:45 AM

6 More Great Security Podcasts

Tuesday, I wrote a post about five security podcasts worth your time. This is a sequel post, directing you toward six more great podcasts that'll make you smarter and better informed about all things InfoSec. 1.) ISC podcast and daily Stormcast from the SANS Internet Storm Center Always a rich source of real-time security monitoring, the Sans Internet Storm Center's podcasts offer quick status checks on threats around the Internet.

Akamai

Akamai

May 27, 2014 8:01 AM

DDoS, as simple as your ABC's

DDoS tool kits, and DDoS-for-hire along with some bitcoins, anonymous email, a TOR connection and a sense of purpose, has made it trivial for individuals, hacktivist collectives and cyber criminals to launch an effective DDoS attack.