Security Articles

  • Project Altair

    March 21, 2016

    LinkedIn's infrastructure needs to seamlessly handle petabytes of data on a daily basis. Our data centers and infrastructure have grown by 34 percent on annual basis and almost half a billion people in more than 200 countries and territories rely on us. In order to reliably deliver our services to our members and customers, we have expanded our data center...

  • Rethinking Path Validation: Pt. 2

    March 16, 2016

    BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to scale. While BGP was originally developed for Internet routing, now it is used in some large institutional networks as well. This two-part post will discuss one proposed model for improving BGP security, based on a talk given by...

  • ASN Graph

    Rethinking Path Validation: Pt. 1, New Requirements

    March 1, 2016

    BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to scale. It is built on the concept of "transitive trust," which will be described below. While BGP was originally developed for Internet routing, now it is used in some large institutional networks as well. This two-part post will...

  • Who Are You? A Statistical Approach to Protecting LinkedIn ...

    January 22, 2016

    Can you can spot your LinkedIn password in the above image? Is your password on LinkedIn the same as another website? Have you been a...

  • Abusing CSS Selectors to Perform UI Redressing Attacks

    November 23, 2015

    Earlier this year, we received an interesting security advisory from Ruben van Vreeland regarding an issue discovered within our...

  • Removing Fake Accounts from LinkedIn

    November 20, 2015

    Integrity of the platform is of the utmost importance to LinkedIn. When members interact with other members on LinkedIn, they expect...