All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where th...
[
This article originally appeared in Virus Bulletin
](http://www.virusbtn.com/virusbulletin/archive/2013/11/vb201311-Neurevt)
Neurevt (also known as Beta Bot) is an HTTP bot [1] which entered the underground market around March 2013 and which is...
2014 has come out swinging with lots of things to discuss in the security threat landscape for January.
Our very own Derek Manky, Global Security Strategist, talks with IDG Enterprise's Keith Shaw on the Target hack, the worst passwords, and the 10-...
This Tuesday, January 28th, marks a significant day of observation. No, it's not another presidential holiday. And you probably won't get the day off from work - at least not without calling in sick.
January 28 is in fact Data Privacy Day. Led by t...
Recently, Proofpoint security researchers published two blog entries (part one and part two) that they have been observing a series of spam campaigns originating in more than 25 % of cases by Internet of Things (IoT) devices. The compromised devices...
This is a Guest Blog by Jessica Carol
Staying under the radar is about to become even harder with tech giants like Apple, Google, Facebook, etc. beginning to show a greater interest in facial recognition. Rather than letting them simply pick the...
I am sitting in the very active parking lot of a large campus in my blacked out van with several laptops and directional antennas. It is just me and my gear. I am trying to break into a "secure" wireless network that had been deployed there when this...
A recent article by Italian IT company, TG Soft brought to light an Android malware that is being served by the official Google Play Store. According to Google Play statistics, the application was installed on 10,000-50,000 devices.
The malware pres...
Early this week it was reported that an IT contractor working for a company called Korea Credit Bureau - which among other things manages credit ratings of consumers - copied the names, social security numbers, phone numbers, home and business addres...
Victoria Martin works in Ottawa as part of the FortiOS technical documentation team. She has a Bachelor's degree from Mount Allison University, as well as a graduate certificate in technical writing from Algonquin College. She started at Fortinet s...
2014 marks the 10th anniversary of Cabir, the world's first mobile phone malware. To mark this occasion, Fortinet's FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10...
This is a Guest Blog by Secured Retail
Retail IT environments are becoming complex as retailers continue to grow and add stores. Each store is another end-point which needs to be secured and all stores need to meet PCI-DSS regulatory requirement...
Happy Saturday! The week is finally coming to an end and in an effort to make the game of catch-up a little easier on you, we have collected some of the biggest news stories right here.
The FCC's Net Neutrality suit has been shot down in a court of...