The Akamai Blog
Safeguard Identity Data at the Source
4 years 7 months ago
When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to have faith that you will protect their information.
Megan Freshley
Akamai Wellness in APJ
4 years 7 months ago
Creating the world's best and most secure digital experience demands the very best industry talent. But as a responsible employer, we also understand how important it is to play our part in looking after those brilliant minds.
Lily Nguyen
Redundant, Secure, and Open Short Domains: A Vision for Multi-Provider Apex Domain Aliases to Enable DNS Diversity
4 years 7 months ago
Human nature is to seek simpler and convenient ways to do things. One example is the sometimes onerous task of typing a URL into a web browser's address bar. Since users prefer short, easy-to-remember URLs, an internet trend is to use short domains for websites (e.g., edgedns.zone). With short website names, users benefit from the convenience of fewer characters to remember and type.
Jim Gilbert
A New Skimmer Uses WebSockets and a Fake Credit Card Form to Steal Sensitive Data
4 years 7 months ago
A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks. As I write this blog post, the attack is still active and exfiltrating data.
Gal Meiri
My Path to Akamai
4 years 8 months ago
Three years ago, I graduated with a bachelor's degree in Electronic Engineering (Mechatronic) from University Tun Hussein Onn Malaysia. I was to be an engineer in the oil and gas industry - but the universe had a better plan for me. Instead, I stepped into IT, providing Technical Support despite my lack of knowledge. I was struggling! But it was there that I found my passion.
Amirah Zahidah binti Onn
Phishing JavaScript Obfuscation Techniques Soars
4 years 8 months ago
In our previous blogs, first where we explained JavaScript Obfuscation techniques and introduced a detailed overview on how JavaScript is being used to obfuscate page content to make phishing attacks and other web scams as evasive as possible; followed by one where we took a deep dive to examine double JavaScript obfuscation techniques, presenting a tale of an obfuscated scam seen in the wild and showing how the same phishing campaign is using numerous obfuscation techniques in an attempt to remain hidden.
Or Katz
Onboarding During A Pandemic: Can It Really Work? New Joiner, Lily Nguyen, Shares Her Experience.
4 years 8 months ago
I recently joined the Sales Development APAC team, looking after the Vietnam, Thailand and Hong Kong markets. I'd already had a great impression of Akamai's culture from my interview rounds. But how would the onboarding work? I'd been looking forward to meeting new colleagues in an office environment. I wanted to feel part of a new team; that sense of collaboration you get from personal interaction. Instead, I only got to meet our IT guy outside the office who presented me with my MacBook Pro.
Akamai
The Tale of Double JavaScript Obfuscated Scam
4 years 8 months ago
The phishing landscape is constantly evolving. Over the years, it has evolved into a more scalable threat, with an overwhelming amount of campaigns being launched daily. Phishing also changed when criminals started adding more capabilities and features to their toolkits, which make the phishing websites long lived and difficult to detect.
Or Katz
Akamai Edge Cloud: Scaling IoT, Part 2
4 years 8 months ago
IoT has tremendous possibilities to transform our world but will fall short of expectations if the underlying infrastructure cannot support the rapid exchange of massive amounts of information from billions of simultaneous and intermittent connections. Akamai Edge Cloud is designed to enable the potential of IoT by utilizing the deep knowledge we've gained operating one of the world's largest edge networks.
Michael Archer
ATA 8.0 Graduation Ceremony
4 years 8 months ago
Akamai Technical Academy is a training program designed for people who have an interest and aptitude for technology but may not come from a traditional technical background. Up until now, we have successfully onboarded over 140 incredible people in three Akamai locations: Cambridge (MA, US), San Jose (Costa Rica) and Krakow (Poland).
Magda Bukala
5G, Security, IoT, Asavie, and Akamai
4 years 8 months ago
Malicious actors never rest and have always worked remotely. That simple realization hit home during recent global events. Specifically, Akamai saw an increase in malware traffic of over 400% between March 9 and May 11, 2020 from corporate devices, most of which were being used outside of a traditional office environment.
Adam Karon
Catch Me if You Can?JavaScript Obfuscation
4 years 8 months ago
While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off....
Or Katz
2020 DDoS Extortion Campaign -- A Sequel More Thrilling Than the Original
4 years 8 months ago
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been "ringing off the hook" since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, badder, and features a broader cast of criminal characters than seen previously with last year's extortion-related activity.
Susan McReynolds
Can Edge Computing Exist Without the Edge? Part 1: The Edge
4 years 8 months ago
If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the "edge" and combine it with "computing" you get edge computing. But if you have been reading headlines, you would be justified in having doubts that the answer is that simple.
Ari Weil
DDoS Extortion Examination
4 years 8 months ago
In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren't seeing...
Tom Emmons
Why Take It to the Edge
4 years 8 months ago
Edge computing is the next natural paradigm shift in IT, bringing a new wave of decentralization. Over the past decade, IT has embraced two seemingly juxtaposed trends: the consolidation of infrastructure and data in private, public, or hybrid clouds, and the growing distribution and diversity of devices that access them. How can these trends continue to coexist? The answer is at the edge.
Lelah Manz
What's New in Security (Part 2)
4 years 8 months ago
Welcome to the Akamai Platform Update!
We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent Platform.
Lorenz Jakober
How to Be Resilient to Data Theft
4 years 8 months ago
Page Integrity Manager is now PCI compliant -- a strong starting point to harden your web applications
Gerhard Giese
What's New in Web Security
4 years 8 months ago
With Akamai's web security portfolio, the top focus this October is on the web application firewall (WAF), with exciting new capabilities: API Discovery and Adaptive Security Profiles.
Renny Shen
Checked
3 hours 21 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed