Security Sidebar: Will The Real “Satoshi Nakamoto” Please Stand Up?

Posted May 02, 2016 by John Wagnon

Some people love the anonymity that the Internet offers.  You can lurk in the shadows using a random pseudonym, and if you are careful enough it’s likely that no one will ever know who you are.  Back in 2008, an inventor named “Satoshi... Read more

You Never Know When...

Posted April 28, 2016 by Peter Silva

An old article gets new life. #TBT Back in 2012 I wrote an article titled Bait Phone. It was about cops dropping mobile phones with a tracking device and following the stealing culprit for an arrest. Like Bait Car but with a smartphone. Over the... Read more

The Importance of Licensing to Equalize Dev and Production

Posted April 28, 2016 by Lori MacVittie

We’re all aware that dev/test != production environments. While the software stacks upon which applications are deployed may be (and hopefully are) the same, there still remains a whole lot of “infrastructure” (that’s everything else) that isn’t... Read more

F5 Agility - Welcome to 'The City of Dreams'

Posted April 28, 2016 by Neil Jaques

This year, Vienna hosts F5 Agility. In advance of the event, we take a look at the hot spots and hidden gems of Austria's capital. Read more

Video Article

Lightboard Lessons: The BIG-IP ASM and WhiteHat Integration

Posted April 27, 2016 by John Wagnon

Today’s web applications are under constant attack, and it’s critical to keep those applications secure at all times.  One of the best ways to keep your applications secure is to protect them with a Web Application Firewall (WAF) and also... Read more

Technical Article

The Dangerous Game of DNS

Posted April 26, 2016 by Peter Silva

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more

Dridex Malware – New Week, New Targets

Posted April 26, 2016 by Doron Voolf

Our ongoing campaign analysis has revealed that Dridex malware’s latest campaign focus has strongly shifted in recent months from U.K. banks, which had been the main targets previously, to US banks today. Dridex and its latest trends are... Read more

Technical Article

A Catch from the Codeshare: Removing iRules from Multiple Virtual Servers

Posted April 25, 2016 by Jason Rahm

In this episode of A Catch from the Codeshare, Jason highlights a tmsh script from community member Kai that removes a specified iRule from any virtual servers from which it is applied. Read more

Answers / discussion