You've seen the blog posts before: "5 Things To Know Before You Head To [fill in conference here]" or "7 Things Every Road Warrior Should Pack For [conference of your choice]". That last one is worthy of a cheesy tag line: &qu...
Fortinet recently encountered a new Ransomware-as-a-Service (RaaS) advertisement called “Encryptor RaaS”. The service is advertised on an onion-based domain via Tor2Web service and Fortinet detects the associated ransomware as W32/Cryptol...
Last week, FortiGuard Labs announced a remote denial of service vulnerability in the Teradata Gateway and Teradata Express. Teradata is a leading provider of big data solutions including business intelligence, data warehousing, CRM, and more. Many hi...
Not long ago, I was ignoring the usual inflight safety message as I waited for takeoff. It's the rare airline that makes these interesting and this certainly wasn't one of them. The only phrase that ever sticks out for me relates to the oxyge...
In the security hardware world, NDPP CC certification is a big deal, especially for government and enterprise customers who require independent assurance that devices can meet critical standards for network protection. These are more than jus...
Internet cheating site, Ashley Madison, is making headlines this week across both mainstream and tech media for the data breach that could expose very intimate personal information for 37 million users. As with the AdultFriendFinder hack we reported...
GamaPoS has received a fair amount of attention since its discovery, in part because the use of .NET is (currently) unique among PoS malware and in part because it leverages the versatile Andromeda botnet. At its core, though, GamaPoS is a scrap...
The internet is built on a flawed design – this is actually well known. The whole network security industry grew because of this weak foundation. Let's not build the Internet of Things (IoT) on yet another flawed design.
Th...
I've kept more than my share of legacy systems alive over the years. Sometimes they've running applications that aren't compatible with newer operating systems. More often, there simply isn't the time or money to deal with an upgrade....
[Updated 19 July 2015 to reflect a fix for the described exploit on Microsoft systems]
A growing number of researchers and analysts recommend disabling the Flash plugin in your web browsers due to ongoing security problems. Perhaps you already did t...
Computer crime has long since gone pro. It’s been years since the computer hacker was a solo act, working out of their basement and defacing web sites for glory. These days it’s all about the money or an agenda, and adversary groups opera...
Since the beginning of the year, a total of 77 Advisories regarding Vulnerabilities in SCADA systems have been released by the ICS-CERT. They cover a total of 133 vulnerabilities, of which 122 correspond to unique CVE's.
Most of the disclosed vu...
The big news last week was a Tsunami SYN flood on a cloud-based mobile and desktop messaging app. But before we talk Tsunamis, a bit of background
TCP is the most common of the Internet protocols, used by protocols such as HTTP, SSL, SMTP, POP, etc....
Today, Adobe has released a new announcement of vulnerabilities, 3 of which were discovered by researchers at FortiGuard Labs. Adobe Flash and Shockwave continue to be a challenge for organizations and vendors to keep secure. Memory corruptions can...