High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Long Tran  |  July 28, 2014  |  Category: Security Research
Asprox, a.k.a. Zortob, is an old botnet that was uncovered in 2007. It is known to spread by arriving as an attachment in spam emails that purport to be from well-known companies. The attachment itself is disguised as a legitimate document file by us...
by RSS Michael Perna  |  July 26, 2014  |  Category: Industry Trends & News
by RSS Axelle Apvrille  |  July 25, 2014  |  Category: Security Research
Once again, SherlockDroid/Alligator spotted a potentially unwanted application for us. The application is a Chinese flirting social networking application whose security level is distressingly low. We detect it as Riskware/Blued!Android. Figure 1....
by RSS Tamir Hardof  |  July 23, 2014  |  Category: Industry Trends & News
Today we announced the availability of the first firewall to cross the 1 Terabit per second threshold. That's 1 trillion bits, or 1 with 12 zero's after it (1,000,000,000,000). But why is it needed now and why is it important? The way we do busin...
by RSS Stefanie Hoffman  |  July 19, 2014  |  Category: Industry Trends & News
by RSS Warren Wu  |  July 17, 2014  |  Category: Industry Trends & News
Just a few short months ago, Fortinet had a major milestone for public cloud computing with the release of our flagship FortiGate security solution on Amazon Web Services environments. Security and privacy continue to be a top issues, if not the #1...
by RSS Zhenhua 'Eric' Liu  |  July 16, 2014  |  Category: Security Research
The Isolated Heap for DOM objects included in the Microsoft Patch Tuesday for June 2014 was just a fire drill aimed at making the exploitation of use-after-free (UAF) vulnerabilities more difficult. The patch for July 2014, however, has been quite a...
by RSS Michael Perna  |  July 16, 2014  |  Category: Industry Trends & News
Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don't think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thriv...
by RSS Ruchna Nigam  |  July 15, 2014  |  Category: Security Research
Following a post by F-Secure this June, bringing to light a variant of the Havex malware family targetting ICS/SCADA systems, there has been much speculation regarding the motives behind this malware campaign. That makes it only the second known malw...
by RSS Richard Henderson  |  July 14, 2014  |  Category: Security Research
This whitepaper is the first of a series of FortiGuard Technical Analyses that go in-depth into the inner workings of malware. In this paper we take a look at the malware known as Soraya. Soraya is unique in that it combines the form-grabbing techniq...
by RSS Dong Xie  |  July 14, 2014  |  Category: Security Research
The year of 2013 was named as The Menace Year mainly because of the rampant CryptoLocker, a nefarious ransomware that encrypts user files and demands for a ransom to be paid in order to decrypt these files. And before CryptoLocker were the unfashion...
by RSS Stefanie Hoffman  |  July 12, 2014  |  Category: Industry Trends & News
by RSS Victoria Martin  |  July 11, 2014  |  Category: Security Q & A
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your...
by RSS He Xu  |  July 10, 2014  |  Category: Security Research
NgrBot is a modified IrcBot. It has the capability to join different Internet Relay Chat (IRC) channels to perform various attacks according to the IRC-based commands from the command-and-control (C&C) server. Recently, our botnet monitoring sys...

FortiGuard Labs on the Web

search results hidden links