Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - The Hidden Threat of Business Logic Attacks->

Submitted by wiredmikey
wiredmikey (1824622) writes "We've been bombarded with headlines of cyber attacks, breaches and hacks all year. One type of attack that often flies under the radar are business logic attacks, sometimes called logic abuse attacks.

Business logic attacks abuse the functionality of a program—as opposed to an application vulnerability. They’re stealthy because they don’t come as malformed requests and they contain legitimate values. Often, we cannot even call them illegal. Mainly performed by business logic bots (BLBs), these types of attacks can perform a variety of attacks including Queue Jumping, Auction Sniping, Poll Skewing, Click Fraud, Poker Bots, and more.

An interesting column highlighting some of the attacks that often go unnoticed and escape the headlines, but are happening every day..."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

The Hidden Threat of Business Logic Attacks

Comments Filter:

In case of injury notify your superior immediately. He'll kiss it and make it better.