Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earlier...
In part 2 of our mobile app strategy, we lay out the mobile security requirements including specifics on authentication, storage, communication, operations and cryptography.
Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is...
The world is changing. At Akamai, we're proud to be part of the shift towards a more inclusive future. Where digital systems may replace human processes, we are determined to keep people at the center of our focus. After all,...