Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Mobile banking and how to stay secure

We live in an app world. We shop through apps, we catch up with the latest news, we follow our sports teams, we listen to music, we communicate with friends and we do our work through apps. We also do our banking through apps, albeit to a lesser... Read more
0 Reviews

Dyre Malware Analysis

Dyre, also known as Dyreza, is a banking Trojan that was first seen around June 2014. With the combination of its ability to steal login credentials by browser hooking and bypassing SSL, its man-in-the-middle (MITM) proxy server, and its Remote... Read more
2 Reviews

Tinba Malware – New, Improved, Persistent

As investigated by Pavel Asinovsky, F5 SOC Malware Researcher, Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014.... Read more
Average Rating: 4.9
3 Reviews

iBanking Malware Analysis

iBanking is malware that runs on Android mobile devices. It is delivered via a new variant of the computer banking Trojan Qadars, which deceives users into downloading iBanking malware on to their android device. It can be used with any malware... Read more
Average Rating: 4.9
4 Reviews

Fear and Loathing ID Theft

Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the... Read more
0 Reviews

The Reach of a Breach

It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost... Read more
0 Reviews

BIG-IP Cluster Upgrade summary

Below is a quick summary for BIG-IP Cluster Upgrade 1- force-offline the standby unit 2- import the  new release 3- install the new release 4- reload after installation 5- online the standby unit 6- force-standby the active unit 7-... Read more
0 Reviews

Know your cyber-attacker: profiling an attacker

I remember the days when hacking was something that people did because they could. It wasn’t quite done for fun, but people wanted to show off their computer skills. More often than not, hacking was harmless, someone broke into a system and left a... Read more
0 Reviews

SDN: An architecture for operationalizing networks

As we heard at last week’s Open Networking Summit 2014, managing change and complexity in data centers is becoming increasingly difficult as IT and operations are constantly being pressured to deliver more features, more services, and more... Read more
1 Review

So Where Do We Go From Here?

If you are who you say you are. I've been travelling the last few weeks shooting some videos for VMware PEX and RSA. When that happens, my browser tabs get crowded with the various stories I'm interested in but will read later. This time... Read more
0 Reviews

All your router are belong to us...

With the recent headlines about vulnerabilities in home broadband routers, http://www.scmagazineuk.com/concerns-over-asus-and-linksys-router-vulnerabilities/article/334710/ and http://www.bbc.co.uk/news/technology-26417441 , I was reminded... Read more
0 Reviews

F5 Anti-Fraud Solutions: Frictionless Protection for the Masses

Anti-Fraud Solutions: Why F5? In 2013, F5 Networks grew its security portfolio to include advanced Anti-Fraud services with the acquisition of the Israeli-based security company Versafe. At the RSA Conference in San Francisco this week, we have a... Read more
0 Reviews

RSA 2014: DDoS Protection (feat Bocchino)

F5 Sr. Systems Architect Ken Bocchino shows me a live demonstration of how F5’s protects the fundamental elements of an application (network, DNS, SSL and HTTP) against aggressively evolving DDoS attacks. Ken is always a fun and interesting... Read more
0 Reviews

RSA 2014: Anti-Fraud Solution (feat DiMinico)

I meet with Mark DiMinico, F5 FSE, to see how F5’s new Anti-Fraud solution works. Mark shows how F5’s advanced fraud protection offers real-time security against multiple fraud threat vectors, preventing attackers from spoofing, disabling, or... Read more
0 Reviews

Bricks (Thru the Window) and Mortar (Rounds)

...or I've been Breached. There was a time when people differentiated between stealing from a physical store and pilfering data from a network.  Throughout the years there have been articles talking about the safety/risks of shopping... Read more
0 Reviews

Security moet (nog) hoger op de managementagenda

Het merendeel van de Nederlandse IT-beheerders (77,5 procent) vindt het steeds moeilijker om zijn organisatie te beschermen tegen cybercriminaliteit. Belangrijkste redenen hiervoor zijn de groeiende complexiteit van aanvallen (zoals DDoS-aanvallen... Read more
0 Reviews

GartnerDC 2013: DDoS Reference Architecture

I meet with Sr. TMM David Holmes to get the scoop on F5’s DDoS Reference Architecture. David has circled the globe talking to customers about their security concerns and shares some of that insight along with explaining how F5 can mitigate those... Read more
0 Reviews

F5 start met pay-per-use voor Amazon Web Services

Per uur betalen en gratis testen van applicatiesAmsterdam 26 november 2013 – F5 Networks start een factuurmodel op uurbasis voor BIG IP Virtual Edition en introduceert BIG IQ Cloud, een orchestration- en managementtool, in de Amazon Web... Read more
0 Reviews

F5 Networks boekt 8 procent meer omzet in 2013

Amsterdam, 24 oktober 2013 – F5 Networks heeft de resultaten van het vierde kwartaal en volledige fiscale jaar 2013 bekendgemaakt. In het vierde kwartaal groeide de omzet met 7 procent naar 395,3 miljoen US dollar. F5 boekte in het hele fiscale... Read more
0 Reviews

Privacy for a Price

A few weeks ago, I went to my usual haircut place and after the trim at the register I presented my loyalty card.  You know the heavy paper ones that either get stamped or hole-punched for each purchase.  After a certain number of paid... Read more
0 Reviews

Vijf beveiligingstips voor managers: laat u niet hacken

Het onderwerp komt steeds hoger op de agenda: bescherming van uw bedrijf tegen kwaadwillende hackers. Los van de gegevens die u mogelijk verliest en de uitval van systemen die de productiviteit schaadt en omzet doet dalen, is er tegenwoordig ook... Read more
0 Reviews

The Million Mobile Malware March

Milestone has been breached according to Trend Micro.  Just a few months ago, they reported in their 2Q Security Roundup that there were 718,000 malicious or risky Andriod mobile apps available (up from 509,000 in Q1) and crystal-ball'd... Read more
0 Reviews

World's Biggest Data Breaches [Infographic]

Cool and disturbing at the same time.  A fully interactive version can be found here where you can click each circle to get more information.   I thought about adding all the numbers but stopped at 140,621,000 between 2012 and... Read more
0 Reviews

The Malware Mess

A couple weeks ago McAfee Labs released the McAfee Threats Report: Second Quarter 2013, which found that Android-based malware marked a 35% growth rate not seen since early 2012.  They also found twice as many new ransomware offerings in Q2... Read more
1 Review

The BYOD dilemma for financial firms

We have spoken a lot about BYOD on DevCentral, but it continues to be a significant issue for countless businesses! Financial firms in particular are, understandably, grappling with the trials of enabling flexible, mobile working whilst protecting... Read more
0 Reviews