Archive for the ‘security’ Category

Hackers vs. “The Media”

April 8, 2016 12:28 pm

0

This article was written by Benjamin Brown for Akamai. We’re used to hearing about cyber attacks against financial institutions and retailers. But another industry faces a growing threat:...

Continue Reading

0
You Are f*cked Without a Backup Plan: 94% of companies without a backup recovery plan are out of business within 2 years of loss

April 29, 2015 2:43 pm

6 karma points

Why is backup so important? One answer to that question is that it’s not IF you will lose your data, but WHEN. Loss may be due to a contractor hitting the wrong switch and deleting critical data, or deletion by a trusted and valuable employee who didn’t notice the server GUI changed. You may have to cope with intentional vandalism by a rogue vendor with access to your network, or a massive attack of thousands of infected computers. Losing your data is a business reality. The question is, can you get your data back … and how fast?

 

The type of data you have, and what that data is precisely, will be a factor in how the data is backed up. Here are some critical tips to approaching backing up your company’s critical data.

6 karma points
Why you need to limit bots

January 20, 2015 9:49 am

15 karma points

The use of bots and scrapers continues to surge, and they are pounding your web server resources, cloud or not. Bot behavior is for the most part benign, but poorly-coded and malicious bots can hurt site speed and performance. They look like DDoS attacks. They may be part of a rival’s competition monitoring, or re-purposing your content and presenting it as their own.

15 karma points
Performance Testing Mobile Networks

January 10, 2015 2:40 am

0

There has been a huge surge in the demand to access a variety of popular applications via mobile devices. This article discusses 2 tools The demand for access...

Continue Reading

0
Why music fans need net neutrality

January 5, 2015 7:53 am

7 karma points

Bands like Fugazi once warned of the influence of an industry principally controlled by “Five Corporations,” of a dystopian mass society where fewer and fewer voices speak to an ever larger and more passive audience. Now we’re down to just three major labels, and despite payola laws, those three companies keep a firm grip on what gets played on commercial radio.

7 karma points
Ustream CEO to CNBC: “We need clear protocols” for cyberattacks

December 30, 2014 10:52 pm

0

When a cyberattack on Sony Pictures resulted in cancellation of the studio’s next movie release, The Interview, the topic of cyberterrorism thrust its way onto front pages around...

Continue Reading

0
The Pirate Bay sails again: downloads searchable and active, database intact

December 12, 2014 10:10 am

5 karma points

As you probably know the beloved Pirate Bay website is gone for now. It’ll be missed. It’ll be remembered as the pilgrim of freedom and possibilities on the web. It’s a symbol of liberty for a generation of internet users.

In its honor we are making the oldpiratebay.org search. We, the isohunt.to team, copied the database of Pirate Bay in order to save it for generations of users. Nothing will be forgotten. Keep on believing, keep on sharing.

5 karma points
Analysis of Black Friday Data Reveals Shift in Attack Vectors

December 8, 2014 12:08 am

0

Akamai can see and analyze enormous amounts of attack data during events such as Black Friday. This year they tracked requests coming into dozens of online retailers over 24 hour...

Continue Reading

0
Eugene, OR Crisis Map: Weather, flooding, earthquakes, traffic and road closures in Oregon

December 1, 2014 12:11 pm

0

Crisis / Crisis Help Map for Eugene, Oregon. Resources for an emergency in Eugene Oregon and the Willamette Valley Related video hosting services & informaion: live radio from...

Continue Reading

0
Google and conservationists are tracking boats to stop illegal fishing

November 14, 2014 12:07 pm

0

Overfishing has been a problem for ages, but oceans are big and it’s not as if the water police authorities can track where every boat drops its nets....

Continue Reading

0
Gravitylab joins President Obama to demand net neutrality

November 13, 2014 6:35 am

3 karma points

Today, President Obama issued a statement calling for strong rules to ensure net neutrality. This is a BIG deal for people who think the Internet should be a...

Continue Reading

3 karma points
Attackers Use DNS Flooder Tool to Amplify DDoS Impact

November 13, 2014 5:57 am

1 karma points

Akamai’s Security Engineering and Research Team issued an advisory this morning warning of a new technique bad actors are using to launch DNS amplification attacks. Amplification attacks generate...

Continue Reading

1 karma points
Five Excellent Security Articles

November 6, 2014 10:31 am

0

Articles I’m reading include such topics as the mounting cost of social engineering, the Mayhem Botnet’s exploitation of Shellshock, and some tips for better security in the healthcare...

Continue Reading

0
Video: TLS/SSL – The evolving TLS standard, new ciphers and more

November 3, 2014 8:14 pm

0

Akamai Chief Security Architect Brian Sniffen reviews the evolution of TLS/SSL during a presentation at Akamai Edge 2014. Following the Heartbleed vulnerability, attention turned to TLS, the fundamental...

Continue Reading

0
Advanced Persistant Threats are are out there. Beware.

October 31, 2014 6:46 am

0

It’s 9pm and Sarah, a systems administrator at a Fortune 1000 company, is working late again. But, tonight is a bit different than her typical stay-late-to-catch-up routine. She...

Continue Reading

0
Akamai Security State of the Internet

October 23, 2014 5:28 am

0

Today Akamai launched an all-security edition of the ‘State of the Internet report’. State of the Internet also has its own website now, where readers can delve into Akamai’s threat...

Continue Reading

0
Spike DDoS Toolkit upgraded today to a high security risk

September 24, 2014 8:04 am

0

  White Hat Synopsis of the Spike DDoS Toolkit and why you must take care.   “In 2014, Akamai has observed a trend in new distributed denial of...

Continue Reading

0
How to: Techniques to redirect an Android phone or tablet, and differentiate between android phone or android tablet

November 20, 2013 4:21 am

5 karma points

  Redirecting Android devices for streaming video: Javascript and PHP You may also be interested in other .js and php redirects we’ve compiled: Here’s javascript to send iOS...

Continue Reading

5 karma points
Mobile Video and Phone Security

September 17, 2013 10:58 pm

6 karma points

Top 10 Mobile Risks Read more at OWASP Mobile Security Project M1: Insecure Data Storage M2: Weak Server Side Controls M3: Insufficient Transport Layer Protection M4: Client Side...

Continue Reading

6 karma points
How to watch streaming video with some expectation of privacy: Proxy your IP address and protect your online identity. Here’s how:

June 30, 2013 9:44 am

1 karma points

SafeIP for Windows computers (Mac alternative below) : Why would you want anyone to know where you are while watching streaming media? CDNs, ISPs, work firewalls can restrict...

Continue Reading

1 karma points
The differences between HTTP downloading and true streaming

April 15, 2008 12:00 pm

4 karma points

Downloading When a user wishes to view video on your site, there are several possible methods that can allow said user to see the video. The easiest method...

Continue Reading

4 karma points