Behind the Firewall | Page 3


_Behind the Firewall is an ongoing series that explores the stories of individuals and organizations in their use of firewall technology. Recently, a user on twitter reached out to us and told us about his home networking story. _ Darin Cowan was a security consultant for nearly 20 years before taking a job as the manager of corporate security at a Canadian financial institution. Darin's experience in the industry has enabled him to build an impressive home network that seconds as a lab for testing and continued consulting purposes. His impressive... [Read More]
by RSS Michael Perna  |  Nov 04, 2013  |  Filed in: Behind the Firewall
It is fair to say that most remote and traveling workers know that no public Wi-Fi hotspot is, or will ever be, deemed completely safe. But these days, that rings especially true for Windows Phone users when connecting to public wireless networks. Earlier this month, Microsoft issued an advisory warning users that a critical flaw in Windows Phone 7.8 and 8 could leave users susceptible to password theft when connecting to rogue Wi-Fi networks. Specifically, the flaw resides in a Wi-Fi authentication mechanism -- PEAP-MS-CHAPv2 - which enables... [Read More]
by RSS Stefanie Hoffman  |  Sep 26, 2013  |  Filed in: Behind the Firewall
Say what you want about large Telcos and other phone companies. Lately, they're putting up a fight to ensure that their customers don't get scammed. According to a recent USA Today article, several carriers have implemented policies aimed at shielding American users from a burgeoning industry of cybercrime operators behind some of the world's biggest SMS premium texting scams. As mentioned in a previous Fortinet post , SMS texting scams, otherwise known as SMShing, entail the act of tricking users into downloading an infected mobile app that causes... [Read More]
by RSS Stefanie Hoffman  |  Aug 29, 2013  |  Filed in: Behind the Firewall
More often than not, malware stealthily infects systems and lifts valuable data long before it is ever detected, let alone eliminated. That said, it's not surprising that some of the most pernicious threats often go underestimated, or are dismissed altogether. But what happens when the opposite is true, when fear and panic surrounding malware come to a dramatic crescendo - so much so that users place valuable resources and security dollars into fighting a costly, but non-existent, threat? That was a hard lesson to learn for one Commerce Department... [Read More]
by RSS Stefanie Hoffman  |  Aug 01, 2013  |  Filed in: Behind the Firewall