Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

May 1, 2014 7:25 AM

Latest State of the Internet Report: Security Highli ...

Akamai released its Fourth Quarter 2013 State of the Internet Report last week. Security highlights include the following: DDoS traffic increased 23 percent quarter-over-quarter, up by 75 percent from fourth quarter 2012.Enterprise and commerce continued to be the industries targeted most frequently.China remained the top producer of attack traffic, growing to 43 percent of observed attack traffic.The United States also saw significant growth in observed attack traffic, while Indonesia's contribution

Bill Brenner

Bill Brenner

April 30, 2014 5:59 AM

Highlights of Prolexic Q1 2014 Global DDoS Attack Re ...

Akamai recently released the Prolexic Q1 2014 Global DDoS Attack Report. What follows are some of the key points, including a 114-percent increase in the average peak bandwidth of attacks.Download the full report HERE

Bill Brenner

Bill Brenner

April 30, 2014 5:43 AM

Two Embarrassing Security Lessons

Good news: I got another look at how well Akamai's security procedures work. Bad news: It's because I made two simple mistakes. And I knew better.

Bill Brenner

Bill Brenner

April 29, 2014 7:14 AM

Storm Stress Tester Crimeware Kit Targets Windows

The Akamai Prolexic Security Engineering & Response Team (PLXsert) has discovered a new tool attackers could use to target Microsoft Windows. The PLXsert advisory describes it this way: The Storm kit is capable of infecting Windows XP (and higher) machines for malicious uses, including execution of DDoS attacks. Once a PC is infected, the Storm Network Stress Tester crimeware kit establishes remote administration (RAT) capabilities on the infected machine, enabling

Martin McKeay

Martin McKeay

April 28, 2014 3:23 PM

2013 DDoS Analysis For Europe

This year, we decided to do something a little different to accompany the year-end State of the Internet Report. In addition to the analysis we do on the numbers for the world as a whole, we're breaking out a particular region to look at in more detail. Although it is not the target of the largest number of attacks, we chose Europe because, like the rest of the world,

Dave Lewis

Dave Lewis

April 23, 2014 5:19 AM

Akamai Is Hiring

One of the most interesting aspects of working at Akamai is the sheer volume of opportunities within the company. Since I started here in my own role last July I have had no end of interesting challenges that have managed to keep me thoroughly engaged. Akamai is a company that allows you to grow and never has a shortage of amazing projects to work on. This sort of excellent working environment invariably brings

Andy Ellis

Andy Ellis

April 16, 2014 1:03 PM

Heartbleed: A History

In the interest of providing an update to the community on Akamai's work to address issues around the Heartbleed vulnerability, we've put together this outline as a brief summary: Akamai, like all users of OpenSSL, was vulnerable to Heartbleed. Akamai disabled TLS heartbeat functionality before the Heartbleed vulnerability was publicly disclosed. In addition, Akamai went on to evaluate whether Akamai's unique secure memory arena may have provided SSL key protection

Or Katz

Or Katz

April 15, 2014 3:00 PM

Cloudification of Web DDoS Attacks

Recent studies and reports show a dramatic increase in the prevalence of denial of service attacks in general, and application layer attacks in particular. As a result of this increase, DoS protection and mitigation solutions have evolved both on the technological side as well as in their ability to scale and protect against larger and more distributed attacks (DDoS).

Andy Ellis

Andy Ellis

April 13, 2014 7:20 PM

Heartbleed Update (v3)

Over the weekend, an independent security researcher contacted Akamai about some defects in the software we use for memory allocation around SSL keys. We discussed Friday how we believed this had provided our SSL keys with protection against Heartbleed and had contributed the code back to the community. The code that we had contributed back was, as we noted, not a full patch, but would be a starting point for