Become a fan of Slashdot on Facebook


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Submission + - The Hidden Threat of Business Logic Attacks (

wiredmikey writes: We've been bombarded with headlines of cyber attacks, breaches and hacks all year. One type of attack that often flies under the radar are business logic attacks, sometimes called logic abuse attacks.

Business logic attacks abuse the functionality of a program—as opposed to an application vulnerability. They’re stealthy because they don’t come as malformed requests and they contain legitimate values. Often, we cannot even call them illegal. Mainly performed by business logic bots (BLBs), these types of attacks can perform a variety of attacks including Queue Jumping, Auction Sniping, Poll Skewing, Click Fraud, Poker Bots, and more.

An interesting column highlighting some of the attacks that often go unnoticed and escape the headlines, but are happening every day...

This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

The Hidden Threat of Business Logic Attacks

Comments Filter:

Heuristics are bug ridden by definition. If they didn't have bugs, then they'd be algorithms.