Security News

The distinction between human and bot behavior is becoming increasingly blurred
2020-07-28 04:00

As consumers change their online habits, the distinction between human and bot behavior is becoming increasingly blurred, presenting cybersecurity teams with an even bigger challenge than before when it comes to differentiating humans from bots, and good bot behavior from bad. In the past, businesses have just blocked all bot activity. Credential stuffing involves using stolen passwords and usernames to hijack accounts-the hacker buys a list of leaked passwords and then has a bot input these passwords on other sites to try to gain access.

It's a Meow-nixed system, I know this: Purr-fect storm of 3,000+ insecure databases – and a data-wiping bot
2020-07-24 21:18

Poorly secured databases are being wiped and vandalized by the thousands in a seemingly automated attack. The nuked databases were left facing the internet by their administrators so that anyone can read and write them, access that malicious software dubbed the Meow bot took advantage of to wreck the information silos.

Overconfident about their security, businesses are falling victims to bot attacks
2020-07-20 03:00

Many businesses are at risk from bot attacks, despite an awareness of the problem and a widely held belief that they have the problem under control, Netacea reveals. It found a high awareness of how bot attacks could negatively affect a business, with over 70% understanding the most common attacks, including credential stuffing and card cracking, and 76% stating they have been attacked by bots.

820% jump in e-gift card bot attacks since COVID-19 lockdowns began
2020-07-16 16:19

Researchers with cybersecurity firm PerimeterX have released new data showing an 820% increase in e-gift card scams since March, when most people began staying home to protect themselves from COVID-19. "E-gift card attacks usually target well-known brands because their e-gift cards are 'hot goods' in the secondary market. Amongst the brands protected by PerimeterX, we saw e-gift card attacks stay fairly steady in the e-commerce vertical since the COVID-19 lockdown started we saw a skyrocketing increase of 820% in such attacks, mainly in online food delivery services," PerimeterX's Yossi Barkshtein wrote in a blog this week.

‘Bot or Not?’ –  a game to train us to spot chatbots faking it as humans
2020-06-10 13:15

Or, as I said when I finished playing a new online Turing Test game called Bot or Not, NAILED IT!! Bot or Not is an online game that pits people against either bots or humans. The creators of Bot or Not - a Mozilla Creative Awards project that was conceived, designed, developed and written by the New York City-based design and research studio Foreign Objects - say that these days, bots are growing increasingly sophisticated and are proliferating both online and offline.

How bots impact retail and e-commerce
2020-05-26 16:51

Akamai CTO Patrick Sullivan explains how bots affect pricing and availability for various retail items. Dan Patterson, a Senior Producer for CBS News and CNET, interviewed Patrick Sullivan, Akamai CTO, Security Strategy, about the ways bots are used in e-commerce and retail.

How bots impact retail and e-commerce
2020-05-25 15:47

Akamai CTO Patrick Sullivan explains how bots affect pricing and availability for various retail items. He also offers consumers advice on protecting themselves from fraud.

Akamai CTO on how bots are used online in legal and illegal ways
2020-05-25 15:35

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle.

How to detect bots: What you need to know
2020-05-25 15:28

Akamai's CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

How to detect bots: What you need to know
2020-05-25 14:29

Dan Patterson, a Senior Producer for CBS News and CNET, interviewed Patrick Sullivan, Akamai CTO, Security Strategy, about how to detect and protect against bots. We've moved up to looking at things like, if somebody says they're on a MacBook running a Chrome browser, and we really interrogate that and fingerprint that device, can they run things like JavaScript? Can they do things that a normal device would be able to do if it asserts to be who it is? And you can find things there, but the bots tend to clean that up as well.