Hot Topics
How Do I Protect Against External Attacks? -

The network layer Network layer security focuses on external threats that are able to bypass the firewall layer.. 

2 days ago | 0
The Ed Tech Conundrum -

If our kids spent as much time studying as they do bypassing firewalls, we’d be cranking out Rhodes Scholars. 

3 days ago | 0
Help Net Security 2015 Predictions -

n 2014, we witnessed the rise of POS malware and ransomware, more targeted, advanced evasion by both cyber crooks. 

4 days ago | 0

How Do I Protect Against External Attacks?

By Aamir Lakhani | On Sat, Dec 20th, 2014 - No Comments »
network-layer-illustration

The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your. 

The Ed Tech Conundrum

By Chris Dawson | On Fri, Dec 19th, 2014 - No Comments »
conundrum

If our kids spent as much time studying as they do bypassing firewalls, we’d be cranking out Rhodes Scholars left and right. I spent several years as one of those all-too-typical public school tech guys. I taught math and science most of the time and had an extra period off during the day to handle every bit of technology in the school. Desktops, laptops, servers, network infrastructure,. 

Help Net Security 2015 Predictions

By Blog | On Thu, Dec 18th, 2014 - No Comments »
FBOG2

n 2014, we witnessed the rise of POS malware and ransomware, more targeted, advanced evasion by both cyber crooks and hackers backed by nation states, and government grade malware going mainstream (bolted-on to ransomware and financial Trojans). So, what can we expect in 2015? According to SentinelOne, OSX and Linux machines will be targeted way more. “The massive adoption of Linux. 

Follow VBA Initiated Infostealer Campaign Exploring Related Malware Actors

By Blog | On Wed, Dec 17th, 2014 - No Comments »
Info-Stealer-Trojan-Nemim-Used-Against-Organizations-from-the-US-and-Japan-391292-2

In late October, we began examination of a VBA-initiated Infostealer campaign. This blog post follows up on additional information we gathered on related malware and associated actors. Pivot On Initial Predator Pain Sample C2 In our previous post, we identified two Command and Control (C2) fully qualified domain names (FQDNs) for the initial Predator Pain sample analyzed: mail.rivardxteriaspte.co[.]uk. 

Man in the Binder: He Who Controls the IPC Controls the Droid

By Blog | On Tue, Dec 16th, 2014 - No Comments »
4015_Binder

At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.” Nitay and Idan’s research of Android’s unique operating system (OS) architecture showed the potential capture of data and information being stored. 

Let’s Be Fair and Test Technology the Same Way We Use It.

By Blog | On Mon, Dec 15th, 2014 - No Comments »
zero_second_ThreatCloud_Central

More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the Zero Second test to find out. The best way to evaluate the effectiveness. 

Security At Grandma’s House

By Chris Dawson | On Fri, Dec 12th, 2014 - No Comments »

Even for companies that don’t normally allow users to work from home, the holidays practically beg for remote work…and plenty of security threats. Earlier this week, Fortinet published a blog and infographic on ways to secure your holiday shopping. Black Friday and Cyber Monday are nearly upon us, after all, and if 2014 has taught us nothing else, it’s that retailers are vulnerable. 

AGbot Attacks Internet VNC Servers

By Blog | On Thu, Dec 11th, 2014 - No Comments »
Showcase Icons-03

Update: After further analysis, we found that this bot might attempt to retrieve another module from an FTP server once it is able to connect successfully. We will update you once we have more information. Last week, our FortiGuard Labs Threat Intelligence system was able to capture an attack targeting internet VNC servers. The attack was raised by a new IrcBot, which we are detecting as. 

Lets Encrypt Free Certificate Authority

By Joey Muniz | On Wed, Dec 10th, 2014 - No Comments »
letsE1

The Internet Security Research Group (ISRT) along with Mozilla Corporation, Cisco Systems, Akamai Tech, Electronic Frontier Foundation and IdenTrust will be offering a new free certificate authority service this up coming 2015 summer (learn more HERE). The concept is the Internet is a dangerous place and enabling protection is a hassle for many businesses. The reason behind this is enabling. 

5 Things You Need To Know About Regin

By Blog | On Tue, Dec 9th, 2014 - No Comments »
Showcase Icons-03

Details are still emerging on the cyberespionage malware known as Regin, but it’s clear that this is no ordinary Trojan. Regin is not new software, despite making headlines this weekend with a myriad of news outlets citingSymantec’s recent white paper on the sophisticated malware. Regin includes several Remote Access Trojan (or RAT, also known as Remote Access Toolkit) features such as.