Earlier this month, the Daily Mail published an article regarding foreign crime gangs stealing millions through hacking email accounts of house buyers and sellers. The con is simple - use malware to steal email credentials, study the content of compr...
Most people are familiar with fractals, if not by name but by appearance. Wikipedia defines a fractal as “…a natural phenomenon or a mathematical set that exhibits a repeating pattern that displays at every scale.” Perhaps the...
Ransomware is a category of malware that scrambles your files or lock your computer while asking for ransom. We have encountered different versions of ransomware, and seen their effects. We also have seen a different kind of ransomware th...
Summary
In March 2015, a Network Configuration Leak vulnerability was disclosed to Ring as part of FortiGuard's Responsible Disclosure process.
The vulnerability existed on their first internet-connected doorbell, Doorbot v1.0 but other posts o...
Malware has been known to use new and innovative ways to evade detection by Antivirus software, a phenomenon AV analysts have often seen with PC malware. Not a lot of examples of the same have been seen employed by mobile malware.
A recently discove...
Summary
On the patch Tuesday of this month, Microsoft patched 3 Office vulnerabilities in MS16-004. The vulnerability CVE-2016-0010 was discovered by myself and Fortinet's threat research team at the FortiGuard Labs. It is a heap overflow v...
Fortinet was founded with the goals of providing the best performing security devices on the planet in combination with unmatched value and features. We take our technology and product quality seriously, and, with that in mind, we want to make...
The recent issue that was disclosed publicly was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to ensuring the quality and integrity of our codebase. This was not a “backdoor” vulnerability is...