High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Chris Dawson  |  August 26, 2015  |  Category: Industry Trends & News
You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash? Not running it. Role-based security measures? Implemented...
by RSS Axelle Apvrille  |  August 25, 2015  |  Category: Security Research
Update Aug 28, 2015: Typos in the final table: CVE-2015-3864 does not concern covr but tx3g. CVE-2015-3828 does not occur for yrrc. Detecting the PoCs published by Zimperium is not difficult: you can fingerprint the PoCs, for example. Det...
by RSS Victoria Martin  |  August 24, 2015  |  Category: Security Q & A
This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire...
by RSS Roland Dela Paz  |  August 24, 2015  |  Category: Security Research
Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack. We start our correlation with the analysis of the exploit payload - a remote adminis...
by RSS Wayne Chin Yick Low  |  August 20, 2015  |  Category: Security Research
Introduction Recently, we came across an unknown document exploit which was mentioned in a blogpost by the researcher @ropchain. As part of our daily routines, we decided to take a look to see if there was something interesting about the document ex...
by RSS Chris Dawson  |  August 19, 2015  |  Category: Industry Trends & News
[Editor's Note: The following is a recap of the recent ANZ Fast And Secure Event provided by Tracey Roberts, Fortinet Marketing Manager for ANZ] More than 120 Partners, Distributors and Fortinet Staff came together last week in Sydney and Melbou...
by RSS Aamir Lakhani  |  August 18, 2015  |  Category: Security Research
Researchers at FortiGuard Labs recently discovered another heap overflow vulnerability in the Adobe Flash Player. The vulnerability, CVE-2015-5129, is similar to a larger group of security issues found in Flash Player, all of which cou...
by RSS Axelle Apvrille  |  August 14, 2015  |  Category: Security Research
You've heard about StageFright, right? Where a malicious MMS compromises an Android handset by exploiting vulnerabilities on the phone's mediaserver. Are you aware that StageFright is not an MMS issue, but an issue with anything that will tr...
by RSS Chris Dawson  |  August 12, 2015  |  Category: Industry Trends & News
Until relatively recently, mobile malware wasn't that different from early PC malware - It was annoying, it probably invaded your privacy, and it took a toll on system resources but it wasn't especially dangerous or costly in the way that mod...
by RSS Dehui Yin  |  August 12, 2015  |  Category: Security Research
Last week, the Internet Systems Consortium (ISC) released a critical update to its popular software, BIND. BIND is almost everywhere on the Internet, acting as a DNS name server. DNS is a network service used to translate human-readable domain names...
by RSS Axelle Apvrille  |  August 11, 2015  |  Category: Security Research
There are already a couple of Android ransomware, but Android/Locker.CB!tr certainly is an interesting one. Smile! The malware is taking a picture of you   The malware claims it has detected "forbidden pornographic" pictures on your...
by RSS Matt De Vincentis  |  August 11, 2015  |  Category: Industry Trends & News
We’re so used to getting what we want, without compromise.  Sometimes, though, we get forced into a one-size-fits-all approach that doesn’t sit well with anyone. How often have you seen small businesses or branch offices using consum...
by RSS Chris Dawson  |  August 06, 2015  |  Category: Industry Trends & News
As the major data breaches affecting healthcare organizations continue and new security concerns around the "Internet of Medical Things" emerge, the presence of healthcare IT professionals at Black Hat is timely. It’s becoming cl...
by RSS Chris Dawson  |  August 06, 2015  |  Category: Industry Trends & News
This year’s Black Hat keynote speaker, Jennifer Granick, gave her talk to applause yesterday rather than the boos and/or skepticism that have greeted other recent speakers. In a nutshell, she delivered a powerful call to action to preserve the...

FortiGuard Labs on the Web

search results hidden links