Say what you want about large Telcos and other phone companies. Lately, they're putting up a fight to ensure that their customers don't get scammed.
According to a recent USA Today article, several carriers have implemented policies aimed at shieldi...
With the explosive rise of smartphones and tablets used in the workplace, wireless networking has moved past optional and into the realm of necessity for almost all organizations. Among other reasons, most users these days have little time or patienc...
Spear phishing attacks are increasing today and the FBI has even issued a warning to the public due to its ability to target multiple organizations. Such attacks are considered as a part of APTs (Advanced Persistent Threats), which attempt to gain a...
This Summer, former NSA contractor Edward Snowden became famous for revealing PRISM, a confidential mass surveillance program run by the US agencies to eavesdrop on phone conversations.
On July 31st the Guardian revealed some more documents leaked b...
Let's face it, there is a lot of confusion about Next Generation Firewalls and how they differentiate themselves from Unified Threat Management (UTM) devices, secure Web, and email security gateways. The myriad terms used to describe them are often u...
Why are we discussing pest control on a security blog?
Anyone who is remotely aware of internet security would know that Remote Access Tools (RATs) are not new to the internet.
The concept is not new, but its implications don't fail to make my bra...
Danny Choi is an Antivirus Analyst at Fortinet and a contributor to VB100 certification test. He holds a BASc degree in Electronics Engineering at Simon Fraser University and has worked at Nokia for his co-op as a RF Performance Test Engineer. He has...
By now, most are familiar with the concept of phishing , when an attacker baits a victim by sending out a persuasive social engineering message coupled with a malicious link or attachment. And even spear phishing , where the attacker similarly reels...
Popular CMS software Joomla released a critical patch advisory earlier this month addressing a flaw in Joomla that allows an attacker the ability to inject malicious code into a Joomla-powered site.
Once compromised, it's likely the site would be us...
Recently, IDC released their latest forecast and vendor share report of the "Worldwide Web Security 2013-2017 Forecast and 2012 Vendor Shares." According to IDC, the worldwide Web security market reached $2 billion in 2012. It's worthwhile to note...
Axelle is a Senior Mobile Malware Analyst Researcher with Fortinet. She hunts malware for mobile phones and try to understand how they work.
.
Once upon a time, Unified Threat Management (UTM) devices were perceived as a simple and relatively basic security tool created to pacify fundamental requirements for mid-sized enterprises and SMBs. And while that more or less remains true, UTMs have...
Those last few months, we have been using and tuning a data mining engine developed by researchers of Telecom ParisTech. The tool is named Alligator, mostly because we believe alligators are hungry animals :) (and a little because this means "AnaLy...
More often than not, malware stealthily infects systems and lifts valuable data long before it is ever detected, let alone eliminated. That said, it's not surprising that some of the most pernicious threats often go underestimated, or are dismissed a...