Asprox, a.k.a. Zortob, is an old botnet that was uncovered in 2007. It is known to spread by arriving as an attachment in spam emails that purport to be from well-known companies. The attachment itself is disguised as a legitimate document file by us...
Once again, SherlockDroid/Alligator spotted a potentially unwanted application for us. The application is a Chinese flirting social networking application whose
security level is distressingly low. We detect it as Riskware/Blued!Android.
Figure 1....
Today we announced the availability of the first firewall to cross the 1 Terabit per second threshold. That's 1 trillion bits, or 1 with 12 zero's after it (1,000,000,000,000). But why is it needed now and why is it important?
The way we do busin...
Just a few short months ago, Fortinet had a major milestone for public cloud computing with the release of our flagship FortiGate security solution on Amazon Web Services environments. Security and privacy continue to be a top issues, if not the #1...
The Isolated Heap for DOM objects included in the Microsoft Patch Tuesday for June 2014 was just a fire drill aimed at making the exploitation of use-after-free (UAF) vulnerabilities more difficult. The patch for July 2014, however, has been quite a...
Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don't think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thriv...
Following a post by F-Secure this June, bringing to light a variant of the Havex malware family targetting ICS/SCADA systems, there has been much speculation regarding the motives behind this malware campaign.
That makes it only the second known malw...
This whitepaper is the first of a series of FortiGuard Technical Analyses that go in-depth into the inner workings of malware. In this paper we take a look at the malware known as Soraya. Soraya is unique in that it combines the form-grabbing techniq...
The year of 2013 was named as The Menace Year mainly because of the rampant CryptoLocker, a nefarious ransomware that encrypts user files and demands for a ransom to be paid in order to decrypt these files. And before CryptoLocker were the unfashion...
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here.
Firewall Policies: How to Build a Better Policy
As networks become more advanced, so do the demands placed upon your...
NgrBot is a modified IrcBot. It has the capability to join different Internet Relay Chat (IRC) channels to perform various attacks according to the IRC-based commands from the command-and-control (C&C) server. Recently, our botnet monitoring sys...