High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Axelle Apvrille  |  July 29, 2013  |  Category: Security Research
Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware....
by RSS Axelle Apvrille  |  July 24, 2013  |  Category: Security Research
It's everywhere in the news, and I couldn't resist trying to figure out how it works. I think I roughly found out but we'll have to wait for Karsten Nohl's presentation at BlackHat to see if I was right :) Getting ciphertexts Mobile phones are capa...
by RSS Kyle Yang  |  July 18, 2013  |  Category: Security Research
Story Around the end of June, I found a new Kelihos binary that was being pushed to all the proxy peers from Kelihos' job servers. At that time, I assumed the binary was just a typical bug fix build. But on July 14th, my Kelihos tracker stopped gett...
by RSS Richard Henderson  |  July 17, 2013  |  Category: Industry Trends & News
Yesterday Oracle released a whopping 89 fixes to many of their products, 27 of which could allow remote code execution. In Eric Maurice's post (Mr. Maurice is Oracle's Director of Software Security Assurance), he outlines some of the most important...
by RSS Richard Henderson  |  July 17, 2013  |  Category: Industry Trends & News
Popular social media/sharing site Tumblr posted a quick note on their official blog indicating that their iOS app wasn't using SSL to pass login and password details when their users were logging in via the app. An astute reader of popular tech news...
by RSS Axelle Apvrille  |  July 17, 2013  |  Category: Security Research
Recently I received this SMS on my mobile phone. Basically, it tells me I have to call back 018377xxxx to collect a parcel. As this phone number is not premium and I was indeed waiting for a parcel, I nearly fell in for the trick. Figure 1. SMS sca...
by RSS Stefanie Hoffman  |  July 16, 2013  |  Category: Industry Trends & News
Patch management is as fundamental to your security posture and health of your network as changing the oil on your car. It's also as easy to overlook until it's too late. Simply defined, patch management is the process of repairing security flaws an...
by RSS Kyle Yang  |  July 14, 2013  |  Category: Security Research
Shortly after 10:00am Jun 25th 2013, many government websites from South Korea were not accessible. It was actually caused by the malware performing ddos attack on 2 major DNS servers (ns.gcc.go.kr and ns2.gcc.go.kr). Original Attack Vector Dur...
by RSS Ruchna Nigam  |  July 12, 2013  |  Category: Security Research
Last month, Symantec blogged about an Android malware named Android.Fakedefender that is the first example of a Ransomware that we have seen on the Android platform. Fortinet detects this malware as Android/FakeDefend.A!tr The malware's operation c...
by RSS Stefanie Hoffman  |  July 11, 2013  |  Category: Industry Trends & News
Our previous post details the history of advanced persistent threats (APTs) as well as some of the most significant attacks, their origins and high-profile targets. In this post, we'll break down the stages of an attack, as well as APT attack tools a...
by RSS Kyle Yang  |  July 10, 2013  |  Category: Biography
CCIE#19065, Director, AV Engine Development. Leader of generic signature team and malware research team.
by RSS Stefanie Hoffman  |  July 10, 2013  |  Category: Industry Trends & News
The concept behind advanced persistent threats (APTs) isn't new. Cybercriminals have been relying on advanced software to leverage attacks that steal data or disrupt systems since the dawn of the computer age. But what distinguishes modern APTs from...
by RSS Ruchna Nigam  |  July 10, 2013  |  Category: Biography
Ruchna Nigam is a security researcher at FortiGuard Labs and works with mobile and PC malware. She is also interested in aspects of security like encryption schemes and biometrics and is getting used to referring to herself in third person.

FortiGuard Labs on the Web

search results hidden links