Next up in the Layered Security series is the Device layer.
If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all artic...
The FortiGate Cookbook website, found at cookbook.fortinet.com, was launched at the end of 2014. You can now enjoy the Cookbook, and all its step-by-step recipes for using a FortiGate, in a whole new way.
If you want to jump right to the website, go...
Network security has traditionally focused on border protection strategies - If you could keep the bad guys out, then your computers, users, and data were safe. As next-generation firewalls (NGFWs) and unified threat management (UTM) appliances hit t...
Penetration testing. Ethical hacking. Call it what you will, but businesses are quickly learning that their security is only as good as their test measures.
No, not that kind of pen testing. Network penetration testing. Ethical hacking. Getting pai...
Angler/Flash 0-day FAQ
Version 1.1 - Friday, January 23 15:45PST
This document will be updated and maintained as new or updated information becomes available. Continue to check this page for updates.
What is Angler?
The Angler Exploit Kit...
As sales and marketing teams continue to search for that secret sauce of engagement in the buying cycle, one thing remains clear, the need for building relationships that lead to closed deals. Whether you’re selling the newest greatest line of...
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it.
One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a...
The latest big budget release out of Hollywood takes on the very lucrative world of blackhat hacking with the appropriately named, "Blackhat".
Fortinet sponsored theaters around North America for a sneak peak at the movie and a look at how hackers h...
For US schools and libraries, this is a big deal (and big business for resellers).
The first quarter of the year is E-rate season for public schools and libraries in the US. E-rate is a federal reimbursement program run by the FCC designed to help...
Actually, at Fortinet it's called a cookbook. And yes, it's pretty thick.
I hate manuals. When I put together IKEA furniture, I only break out their cryptic pictogram instructions as a last resort. And when I get new hardware in my hands,...
A few weeks ago, we received a file that was being spread as an attachment in a spear phishing email. The sample, which we are detecting as W32/Byanga.A!tr, turns out to be a dropper for a bot which, if active in an organization’s system, has t...
Considering this year’s Fortinet GPC was on a cruise ship that departed out of sunny South Florida, it seemed appropriate to infuse a quasi-Latin flair into a new music video produced by Fortinet’s marketing team. With the help of singer...
As malware continues to grow on Android (900K malicious samples and 1,300 new per day), we sometimes forget attacks can also affect other devices... like Amazon's Kindle. The Kindle indeed runs Fire OS, a fork of Android. Thus, in several cases,...
Andromeda is a botnet that has had a long history. The latest version is now 2.09, which most active bots would have already received. Recently, however, our FortiGuard Labs Threat Intelligence system was able to capture the activities of a previous...