Latest Posts | Page 126


Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin. In the new Bitcoin heists, the botnets that take over a victim's computer aren't intended to steal a victim's money - although they are certainly capable of doing that, too. However, in the latest shenanigans, the malware compromises a computer... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Botnet owners took a page out of Chef Emeril Legasse's cookbook and 'kicked it up a notch' last week when they launched a massive Distributed Denial of Service (DDoS) attack on Internet spam fighter Spamhaus, content delivery provider CloudFlare and other Internet infrastructure providers. The Spamhaus Project provides blacklisting services to many ISPs and email servers around the world with the intent of stopping the billions of spam emails sent daily. Spamhaus reports that through their services, they are able to stop 80 million spam emails... [Read More]
by RSS Richard Henderson  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
After April 08,2014, the Extended Support for Windows XP will expire and Microsoft will cease to issue any more updates or patches. It will have a significant impact on Windows XP users, particularly in terms of vulnerabilities and exploits. If you just bought a computer recently and it came with a copy of Windows 7 or 8, you don't need to worry about Microsoft's Windows XP expiration deadline. Systems running Windows XP after the expiration date may be exposed to malware exploiting zero-day vulnerabilities and unknown bugs. Since no support and... [Read More]
by RSS Raul Alvarez  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
For geeks like me, 1986 was a great year... IBM unveiled their \"PC Convertible laptop\", the [\"first MS-DOS virus, Brain,\"](http://en.wikipedia.org/wiki/Brain_(computer_virus) was released, and the \"Electronic Communications Privacy Act of 1986 (ECPA)\" was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another. But, this article is about email, privacy and you. What does the ECPA have to do with that? See, back in 1986 servers... [Read More]
by RSS UnAttributed  |  Jul 30, 2012  |  Filed in: Industry Trends
There was a flurry of news articles out recently highlighting some interesting data points from IDC. In particular, according to IDC, worldwide factory revenue from security appliances was up 7.2% year on year to $2.3 billion, as unit shipments increased 5.2% to 538,428. Granted, Q4 is generally the strongest quarter in the tech industry, so it should be no surprise to most to see a strong finish to the year. \"Fortinet saw the largest revenue growth among the top five vendors at 27.2%,\" according to IDC. What is interesting is this graph (thanks... [Read More]
by RSS UnAttributed  |  Jul 30, 2012  |  Filed in: Industry Trends
One of the WORST riddles I can recall from my youth is, \"When is a door not a door? When it's ajar.\" A riddle that's also a pun?!... Seriously, who comes up with this? But, I digress... One thing that is not a laughing matter is maintaining PCI DSS wireless compliance. And, did you know that in today's distributed retail enterprise, sometimes a rogue AP is not a rogue AP. No, really. Ask yourself, \"When is a rogue AP not a rogue AP? When it's outside the CDE!\" (Now, doesn't that just make you smile?) Kidding aside... Let's look at the... [Read More]
by RSS UnAttributed  |  Jul 30, 2012  |  Filed in: Industry Trends
Some interesting results from our recent FortiBlog survey. When asked how your organizations are dealing with client software on personal devices, out of 286 respondents, more than half of you stated that such devices are not permitted on your network. About a third said you're using Mobile Device Management clients and the rest were using either VPN clients of virtual desktop technology. I'm struck by the large number that do not permit personal devices on your network. And, I wouldn't be surprised if this number decreases rapidly in the coming... [Read More]
by RSS Kevin Flynn  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
Rick Popko is the public relations manager at Fortinet and has been covering the network security space for the last three years. Prior to joining Fortinet, Rick was a group manager at Weber Shandwick, a worldwide public relations agency, where he focused most of his time on enterprise technology accounts. His clients included, Cisco, Dolby, Hitachi, LifeSize and BEA systems. Before joining Weber Shandwick, Rick was a journalist for eight years, writing for and editing at a number of technology publications, including Multimedia World, PC World,... [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in:
DexLabs' @thuxnder has recently posted a challenge for Android which is both interesting as a challenge and as a PoC, because it shows how to fool Dex disassemblers. Basically, his strategy consists in using a branch condition, opaque but always true in reality that jumps over the next instruction which is a fill-array-data-payload Dalvik instruction. Then, after the fill-array-data-payload, there are further Dalvik instructions. Most disassemblers disassemble one instruction after the other, and hence understand the final instructions as meaningless... [Read More]
by RSS Axelle Apvrille  |  Jul 30, 2012  |  Filed in: Security Research
BYOD – Lessons From The Past In a recent survey of people in their 20’s conducted by Fortinet, the majority of respondents stated that bringing their own device (BYOD) to their workplace was a right and not a privilege. http://blog.fortinet.com/study-gen-y-would-break-rules-for-byod/ And nearly a third said that they would contravene a company’s security policy that forbids them to use their personal devices at work or for work purposes. Surely, a client-centric approach to BYOD will face difficulties when so many workers will actively seek... [Read More]
by RSS Kevin Flynn  |  Jul 23, 2012  |  Filed in: Industry Trends