Latest Posts


Over the past month, we have all watched with dismay as the islands of the Caribbean and coasts of Texas and Florida were hit with devastating rains and high-speed winds. In the days leading up to the storms’ landfalls, some of the most talented scientific minds deployed astounding levels of technology to assess and communicate the severity of the approaching threats—despite the fact that severe weather is notoriously unpredictable, with inherent uncertainty that makes truly accurate assessment of the threat nearly impossible. In... [Read More]
by RSS Phil Quade  |  Oct 20, 2017  |  Filed in: Industry Trends
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Apvrille  |  Oct 19, 2017  |  Filed in: Security Research
Do you ever feel the Internet is especially slow these days? Or do you ever wonder if maybe it’s just your computer that’s getting slower? Don’t rush to the IT shop to buy a new computer yet … you may have been a victim of a new trick used by malevolent hackers called browser “cryptojacking.” What is cryptojacking? It’s a trick used to mine cryptocurrencies on your computer using your CPU resources in the background without your knowledge. All that a cybercriminal has to do is load a script... [Read More]
by RSS David Maciejak  |  Oct 19, 2017  |  Filed in: Security Research
One of our daily routines as researchers here at FortiGuard Labs is to write and maintain our internal fuzzers to help us more effectively find potential vulnerabilities on different software products. In this blog post we would like to share how we discovered multiple Embedded Open Type (EOT) font vulnerabilities by using a combination of dumb and intelligent open source fuzzers. [Read More]
by RSS Wayne Chin Yick Low  |  Oct 19, 2017  |  Filed in: Security Research
Fortinet’s Vice President of Strategic Programs, Jonathan Nguyen-Duy, recently hosted a webinar called “Implementing Security with Digital Transformation Initiatives.”  This talk touched on why digital transformation is so crucial across industries, as well as the technological capabilities organizations need to adopt in order to ensure a successful digital transformation.   [Read More]
by RSS Susan Biddle  |  Oct 19, 2017  |  Filed in: Industry Trends
In an effort to meet consumer demands and business needs, moving business-critical infrastructure and operations over to cloud environments is becoming less of an option and more of a requirement. Recently, we wrote about the digital transformation that will, sooner rather than later, be adopted by our channel partner’s clients. This transformation will be focused on enabling business operations and consumers with such things as big data analytics, IoT devices, and new technology that is faster and more agile than ever. The ability to offer... [Read More]
by RSS Amy Thompson  |  Oct 18, 2017  |  Filed in: Business and Technology
Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,... [Read More]
by RSS Michael Xie  |  Oct 17, 2017  |  Filed in: Business and Technology
On Monday morning it was announced that WPA2, WiFi’s most popular encryption standard, had been cracked. A new attack method called KRACK (for Key Reinstallation AttaCK) is now able to break WPA2 encryption, allowing a hacker to read information passing between a device and its wireless access point using a variation of a common – and usually highly detectable – man-in-the-middle attack. If successful, this vulnerability can potentially allow a hacker to spy on your data as well as gain access to unsecured devices sharing the... [Read More]
by RSS Bill McGee  |  Oct 16, 2017  |  Filed in: Business and Technology, Security Research
In light of today’s huge skills gap, security professionals have an obligation to mentor the next generation. Employees of cybersecurity vendors can help shrink the gap by volunteering their time in the classrooms, from elementary school through college. The knowledge and experience of front-line professionals is invaluable, whether to explain to first-graders what malware is or to steer college students toward the right classes to give them a strong foundation for a cybersecurity career. The problem is bigger than any one vendor or educational [Read More]
by RSS Anthony Giandomenico  |  Oct 16, 2017  |  Filed in: Industry Trends
From October 15th – 18th, the 2017 Internet2 Technology Exchange will take place in San Francisco, CA. The Technology Exchange brings together leaders from the research, education, and technology communities to discuss and find solutions to the technical challenges that threaten the missions of their organizations. The robust Internet2 community comprises 317 US higher education institutions, 81 leading corporations, 64 affiliate and federal affiliate members, 43 regional and state education networks, and more than... [Read More]
by RSS Susan Biddle  |  Oct 15, 2017  |  Filed in: Business and Technology