Security Articles

  • featuredimage7

    Open Sourcing Jaqen, A Tool For Developing DNS Rebinding PoCs

    July 27, 2017

    Editor’s note: Members of the information security team at LinkedIn have an opportunity to work on research topics under a well-defined framework that allows them to evaluate new products and technologies, as well as explore the related threat surface. The team strives to find new and innovative ways to help simplify and strengthen security and contribute back...

  • Salary Explorer screenshot

    Bringing Salary Transparency to the World

    November 2, 2016

    This blog post was updated on June 15, 2017 Coauthor: Santosh Kumar Kancha There are any number of different factors that go into a decision about accepting a new job opportunity. What are the values of the company? Does the role fit my skillset? Is there growth trajectory? How long is my commute going to be? What are the benefits? Who would I be working with?...

  • Open Sourcing URL-Detector

    June 30, 2016

    Today, we’re excited to share that Linkedin is open-sourcing our URL-Detector Java library. LinkedIn checks hundreds of thousands of URLs for malware and phishing every second. In order to guarantee that our members have a safe browsing experience, all user-generated content is checked by a backend service for potentially dangerous content. As a prerequisite for...

  • Project Altair

    March 21, 2016

    LinkedIn's infrastructure needs to seamlessly handle petabytes of data on a daily basis. Our data centers and infrastructure have...

  • Rethinking Path Validation: Pt. 2

    March 16, 2016

    BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to...

  • ASN Graph

    Rethinking Path Validation: Pt. 1, New Requirements

    March 1, 2016

    BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to...