Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

The Hidden Threat of Business Logic Attacks

wiredmikey (1824622) writes | more than 2 years ago

Crime 0

wiredmikey (1824622) writes "We've been bombarded with headlines of cyber attacks, breaches and hacks all year. One type of attack that often flies under the radar are business logic attacks, sometimes called logic abuse attacks.

Business logic attacks abuse the functionality of a program—as opposed to an application vulnerability. They’re stealthy because they don’t come as malformed requests and they contain legitimate values. Often, we cannot even call them illegal. Mainly performed by business logic bots (BLBs), these types of attacks can perform a variety of attacks including Queue Jumping, Auction Sniping, Poll Skewing, Click Fraud, Poker Bots, and more.

An interesting column highlighting some of the attacks that often go unnoticed and escape the headlines, but are happening every day..."

Link to Original Source

Sorry! There are no comments related to the filter you selected.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?