High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Raul Alvarez  |  July 30, 2012  |  Category: Security Research
date: 2014-05-01 01:00:00 -0700 category: "Security Research" [ This article originally appeared in Virus Bulletin ](http://www.virusbtn.com/virusbulletin/archive/2014/02/vb201402-Sality) [ For Part 1 of this article Click Here ](http://blog...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
date: 2013-10-14 06:00:00 -0700 category: "Security Research" Final panel on collateral damage in cyber-warfare This post is the third in a three part series. Click here for Part 1 and here for Part 2 Fabio Assolini, Andrey Makhnutin - PAC - the...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
I had always wanted to look into Firefox OS. It's done. I created my first application. What kind of application does a reverse engineer write as first app? A CrackMe of course. You can try it: the sources are available here. But, honestly, it is r...
by RSS Alexandre Aumoine  |  July 30, 2012  |  Category: Security Research
Get rid of clichés: "Most of anti-virus software products detect malware pieces only through simple checksums. This is often the case for the anti-virus engines which are integrated into network gateways." People mainly believe that th...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
I recently tried an amazing browser extension named Datarmine whose goal is to secure social network posts. It works for Facebook, Twitter etc. The idea is that your posts get encrypted, and only people with your secret key can decrypt it. Others see...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conference, with the agenda, paper abstracts and a few news. Figure 1. IE...
by RSS Ruchna Nigam  |  July 30, 2012  |  Category: Security Research
We recently had a company contact us regarding an email they received from their bank. The company's access to its online banking account was blocked by its bank due to fraudulent activity observed through the account. A screenshot of the email rec...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
One of the hottest buzz of the moment certainly is the breaking news about NSA collecting phone records of Verizon subscribers. According to court order, Verizon has been asked to provide NSA daily information for all its phone records between April...
by RSS Zandro Iligan  |  July 30, 2012  |  Category: Security Research
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code. This one was intriguing, though: wit...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One of the samples was targeting a Japanese audience, while the other sample was for Korean end-users. I was interested in...
by RSS Axelle Apvrille  |  July 30, 2012  |  Category: Security Research
"Is mobile malware really an issue?" is probably among the most frequent questions my friends ask me regarding my work. I usually like to answer indirectly with a graph as below: Figure 1. Evolution of malicious Android samples. Light blue curve...
by RSS Ruchna Nigam  |  July 30, 2012  |  Category: Security Research
Last week the security world was abuzz with news of a new attack vector for mobile attacks. The malware was sent to the accounts of Tibetan human rights advocates and activists from the hacked account of one of the activists regarding the the World U...
by RSS Richard Henderson  |  July 30, 2012  |  Category: Security 101
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password - one that doesn't contain words from the dictionary, and consists of...
by RSS Stefanie Hoffman  |  July 30, 2012  |  Category: Security 101
Last year, tech giant Yahoo! Inc. fell victim to a cyberattack. But unlike other high-profile attacks, the culprit wasn't an APT or sophisticated threat sourced to a nation state. The weapon of choice was a simple SQL injection. According to reports,...

FortiGuard Labs on the Web

search results hidden links