Get In Touch
Akamai CSIRT has identified a trend in online extortion that has the potential to impact customer websites and their users. Attackers are using reflected UDP to launch direct-to-origin denial of service attacks at e-commerce sites, then demanding payment to stop the attacks, CSIRT's Mike Kun wrote in an advisory. "We have seen these extortion attempts target e-commerce and retail sites, as well as online collaboration sites, but all sectors are
The OpenSSL Project today disclosed new vulnerabilities in the widely-used OpenSSL library. These are vulnerabilities that can potentially impact OpenSSL clients and servers worldwide. The most interesting is the ChangeCipherSpec Injection, which would enable a man-in-the-middle attack to force weaker ciphers into a communication stream. Akamai SSL services (both Secure Content Delivery and Secure Object Delivery) have been patched for this vulnerability. The other vulnerabilities are relatively uninteresting for our
Akamai Security Advocate Dave Lewis (@gattaca on Twitter) has written a new post for Forbes. He argues that we need to assume that our systems will fail and fail hard. "We need to build network security with failure in mind," he wrote. "There was once a notion of 'bricks and clicks' that was meant to demonstrate a delineation between retail and online presence. This too has fallen by the wayside as
Yesterday was my one-year anniversary at Akamai, and it's been a great learning experience. To measure the journey, I took a look at posts written in the past year. The following compilation captures the lessons that have made the biggest impression so far.
A look at the security issues making headlines so far this week: Phishing campaign touts fake 'Heartbleed removal' tool (Computerworld) The program attached to the emails is actually a keylogger, according to Trend Micro. Iranian Cyberspies Pose as Journalists Online To Ensnare Their Targets (Dark Reading) Cyberspying campaign out of Iran combines social engineering and social media to steal credentials from a wide array of US and Israeli military, government,
Though it's still two months away, this is the time of year when those headed to Black Hat, DEF CON and BSidesLV start fretting over registration, flights and hotel bookings. This year I decided to get a jump on things, and here are a few things I've learned that will hopefully make your lives easier.Akamai security staff will be there in force, and we're certainly looking forward to it.
I've been participating in an ongoing, online panel hosted by the Information Security Buzz website. The latest question is, "Based on your experience and knowledge, what would you say is the BEST Information Security event to attend and why?"
Tuesday, I wrote a post about five security podcasts worth your time. This is a sequel post, directing you toward six more great podcasts that'll make you smarter and better informed about all things InfoSec. 1.) ISC podcast and daily Stormcast from the SANS Internet Storm Center Always a rich source of real-time security monitoring, the Sans Internet Storm Center's podcasts offer quick status checks on threats around the Internet.
DDoS tool kits, and DDoS-for-hire along with some bitcoins, anonymous email, a TOR connection and a sense of purpose, has made it trivial for individuals, hacktivist collectives and cyber criminals to launch an effective DDoS attack.