antivirus


Recently, we came across some interesting samples in jtd format, which is the file format used by JustSystems Ichitaro. The following is a quick primer for readers who are unfamiliar with the Japanese market. [Read More]
by RSS Minh Tran  |  Nov 09, 2017  |  Filed in: Security Research
Financial organizations can benefit from a change in thinking. Read this post to learn how thinking like a cybercriminal can prevent data breaches. [Read More]
by RSS Brian Forster  |  Sep 30, 2016  |  Filed in: Industry Trends
Ransomware is a category of malware that scrambles your files or lock your computer while asking for ransom.  We have encountered different versions of ransomware, and seen their effects.  We also have seen a different kind of ransomware that not only holds your computer for ransom, but also infects your files for persistency. Virlock is a ransomware that locks your screen for ransom, while infecting your files with its malicious code. Virlock is an interesting malware not only because it is a ransomware and file infector in one, but... [Read More]
by RSS Raul Alvarez  |  Jan 26, 2016  |  Filed in: Security Research
It was a morning like lots of others...I was headed to the airport for a week in our home office, so I got an early start, checked on the sheep on the way out (yes, sheep), and got on the road. Aside from being ridiculously early, the ride was uneventful until I got to my exit for the Mass Pike. That's I-90 for those of you outside Massachusetts and, when traffic is good (like at 4:30 in the morning), it's the fastest, easiest way to the airport. And the exit was closed. Well darn. I had Google Maps running, not because I didn't know... [Read More]
by RSS Chris Dawson  |  Sep 28, 2015  |  Filed in: Industry Trends
Traditional client AV has been plagued with problems relating to performance, updates, and effectiveness. A new generation of endpoint protection is changing the game. Antivirus software has not exactly been a favorite of either users or administrators for some time. Consumer PCs usually come with at least a trial of antivirus software but BYOD and a growing number of mobile endpoints has left IT in a pinch: How do you ensure that every employee’s phone, laptop, tablet, and/or desktop is adequately protected, especially when they aren’t... [Read More]
by RSS Chris Dawson  |  Apr 29, 2015  |  Filed in: Industry Trends
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Web Filtering is one of your first lines of network defense, preventing known threats from reaching your network so your other security features can handle the unknown threats, and preventing users from accessing content that could be distracting, a drain on bandwidth, or a liability risk. Below is a collection of videos to introduce you to Web Filtering, using FortiOS 5.0. User-specific Web Filtering This video introduces you to the concept of web filtering, and provides an example of how it can be used to grant or limit access based on user... [Read More]
by RSS Jonah Davidson  |  May 08, 2014  |  Filed in: Security Q & A
Intrusion prevention system, or IPS, is like the secret ingredient in a favorite recipe -- it is rarely consumed by itself, but most security suites and Unified Threat Management devices wouldn't be considered complete without it. In fact, it's often taken for granted. IPS is a vital component of any comprehensive security solution and a necessary part of a compliance-driven environment. And while it is one of the most traditional security solutions on the market, its features continue to evolve to tackle a maelstrom of modern attacks. Essentially... [Read More]
by RSS Stefanie Hoffman  |  Nov 13, 2013  |  Filed in:
You ran all the scans, conducted all the tests and yep…you've got malware Last month, we detailed steps you could take in those critical and panic-filled moments when you realized that you might have clicked on a malicious link or opened an infected attachment, but weren’t quite sure you’d been infected. Now, in a follow-up, we'll note a few actions you can take in the event that malware was indeed installed on your computer. First, nothing substitutes for the expertise of an IT professional for an accurate assessment of your computer’s... [Read More]
by RSS Stefanie Hoffman  |  May 02, 2012  |  Filed in: Industry Trends
When it comes to antivirus, how much coverage do you need? Everyone has different concerns when it comes to antivirus coverage. Some people want to circle the wagons and let very little into their networks, while others need some basic protection but prefer speed, speed and more speed. In this article I'll discuss the new antivirus features in the FortiOS 4.0 MR2 for the FortiGate family and how your device can be configured for your preferred level of coverage versus performance. Malware Lifecycles All malware have a life cycle. Some are like... [Read More]
by RSS Jeff Crawford  |  Apr 05, 2010  |  Filed in: Security Research