David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.read more
The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it. The only void I noticed among the technical vendors was addressing the issue of hacktivism. In the packed conference and crowed exhibition halls, I never came across a discussion about this phenomenon. Can we forecast this risk? Do we know its long term effects? I think most of us are still befuddled by this concept.read more
In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers. Recently, more light has been shed upon even more abuse coming to the Web in the form of aggressive API’s and bots to automate Web processes. Beyond competitors and price index advantages, people are using bots for profits and personal advantages.read more
In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’ websites for business intelligence purposes is quickly becoming a common practice. Recently, an article by Slashdot shared that people are even using bots and scripts to score restaurant reservations. Likewise, Variable Pricing software and methods are being used by many e-commerce websites in order to reduce their sales costs and obtain greater control over the buying process.read more
Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing you that they are currently experiencing a cyber attack. Why are they calling you? The attack is coming from your servers.read more
Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.read more