It's that time of year again. With less than two months to go before the April 15 tax deadline, scammers are in full swing, eager to separate taxpayers from their hard earned refunds.
No doubt, scammers will pelt unsuspecting victims with a slew of...
This week, the issue of online data privacy received more than its fair share of attention. And with good reason.
The Obama administration announced Thursday that it intended to place increased importance on online privacy with the proposed "Consume...
The term "survival of the fittest" seems to be particularly apt when it comes to the Koobface worm. Over the years, the notorious social networking botnet has survived an almost unrelenting media spotlight, serial security improvements and even a mas...
More and more organizations are opening up their networks with invitations that say BYOD (bring your own device) and seeing everything from iPads to the latest Android gadget walk in their doors.
And no one can deny that this trend is accelerating r...
This week it's no secret that the Fortinet team that has been hitting it pretty hard on the Adobe front.
For San Jose, Calif.-based Adobe, Valentine's Day came with a bang when researcher Honggang Ren of Fortinet's FortiGuard Labs detected a total o...
These days, healthcare organizations have their hands full when it comes to compliance. In addition to adhering to a slew of industry regulations, such as HIPAA and HITECH, designed to protect patients' confidential information, medical facilities of...
Black Hat Europe 2012 is now a month away, and this year, Fortinet researchers are taking their place among the headliners with three presentations in the lineup.
“An Attacker's Day Into Virology: Human vs Computer" : What do influenza and the Con...
Third of our three part series on the Anatomy of a Crimeware Syndicate, as delineated by Derek Manky, Senior Security Strategist at Fortinet. In part one we discussed the fundamental infrastructure and hierarchy of a crimeware syndicate. Part two tal...
** Part two of our three part series Anatomy of a Crimeware Syndicate. In part one we talked about the hierarchy and operations of a crimeware syndicate. Today we’re going to talk about the threat landscape that sustains crimeware and part three w...
The first of a three-part series, delineated by Fortinet's Derek Manky, which closely examines crimeware syndicates' infrastructure, the current threat environment that sustains these underground networks and possible protection mechanisms for tar...