21st November, 2016 3 Min read
Book a Demo
With new technologies, bots will soon be able to act more like humans than humans themselves. According to various reports, bot operators control a percentage of PCs around the world and users are unaware of it. In the US, one estimate was 6%. When bot operators have access to a PC, that means they have access to all of the user’s history and activities. Bots will also spend the right amount of time on each page, move the mouse across the screen as a real user would, click on the right parts of the website and so on. Contrary to what you may think, this just means that bot mitigation platforms will develop better ways to defeat bots, and GlobalDots will be here to help you pick the right one and never worry about bots again.
Reduce your AWS costs by over 50%
Discover your Cloud Saving Potential – Answer just 5 simple questions. AppsFlyer, Playtika, Lufthansa, IBM, top leading companies are already using our FinOps services.
Read more: Bizety
Akamai published an article which explains that even though many organizations think they know what the DDoS landscape looks like, it’s all based on months old information. Right now the DDoS landscape is changing faster than anything else with botnets like Kaiten that uses routers and other devices and Mirai that users IP connected cameras and DVRs. The release of Mirai is not something that can be rolled back. The code is available and everyone from amateurs to professionals who want their own DDoS botnet are looking at the code to create a bigger, better, newer version. The message here is to hope for the best, but prepare for the worst.
Read more: Akamai
UK’s parliament’s House of Lords on Wednesday passed a surveillance bill that provides the government extreme powers over the data of citizens. This is now known as The Investigatory Powers Bill or “Snooper’s Law” and is currently being passed through British Parliament and is awaiting only the Royal assent to become law. This bill basically means that every ISP in UK will be required to backup all browsing data of UK users for up to a year and make it available to authorities whenever they please.
Read more: Hacking Threat
Facebook is buying leaked passwords from black market vendors to protect their users. The reason being the recent data breaches relating to Yahoo, Twitter, Linkedin, Myspace & Dropbox and the possibility of users using the same password with their facebook account as well. When Facebook purchases these passwords, they cross-reference these with the current account password and notify the user if they should use another password to protect their account. Facebook has been able to identify and alert tens of millions of users with compromised passwords.
“It turns out that we can build perfectly secure software and yet people can still get hurt”
– Alex Stamos, Chief Security Officer at Facebook
Read more: Hacking Threat
Previously it has been speculated that the Mirai botnet, which is behind the Dyn outage and counted as the biggest DDoS attack so far, has been using CCTV cameras mostly with DVRs and routers as a supporting role. It turns out DVRs were the main players behind the attack as CCTVs offer less functionalities than DVRs and therefore are a less flexible attack platform. CCTVs also had a near-identical code to the DVRs, so this is where possibly the confusion was made.
EX.CO is a video technology platform that enables publishers to monetize video content on websites.
Justt is a chargeback mitigation startup based in Tel Aviv. Chargebacks, as defined, are demands by a credit card provider for a retailer to reimburse losses on fraudulent or disputed transactions. Justt’s objective is to assist merchants worldwide in combating false chargebacks using its proprietary artificial intelligence technology.
The cloud used to be viewed as a place of significant cost savings: rather than purchasing and maintaining dozens of server stacks, organizations could outsource this and purchase compute power on an as-needed basis. In the ensuing rush to cloud architecture, however, many companies simply lifted-and-shifted their old financial bad habits. The sheer speed of […]
Cloud computing has transformed more than individual app architectures: it’s granted both start-ups and market leaders an equal platform for innovation. New products are no longer dependent upon complex revenue-draining in-house server stacks. Instead, cloud-native disruptors such as Uber and Airbnb have been able to harness the once-unthinkable degrees of agility, scalability, and cost-efficiency that […]
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.