cloud | Page 5


Recently, we found a simple malicious downloader that downloads a fake PDF file.  Unlike a normal malicious loader that integrates the PE Loader code into its binary, this loader has stripped this part and has turned to fetching it online. Our FortiGuard Labs Threat Intelligence system can detect the traffic of this downloader, which we are detecting as W32/Upatre.FT!tr, efficiently aiding in the analysis of this malware. Registering Online Once executed, the loader grabs the local victim’s system information, generates them... [Read More]
by RSS He Xu  |  Feb 23, 2015  |  Filed in: Security Research
As increasing numbers of employees work from home, organizations often overlook the security needs of remote workers. Telework predates the BYOD phenomenon by decades. Despite Yahoo!’s move to the contrary, many organizations are shrinking their office spaces and expanding their employees’ ability to work from home. Employees value the flexibility and the lack of a commute, while employers value lower operating costs and workers who happily blur the line between home and professional life, working extended hours long after they might have left... [Read More]
by RSS Chris Dawson  |  Nov 05, 2014  |  Filed in: Industry Trends & News
Today we announced the availability of the first firewall to cross the 1 Terabit per second threshold. That's 1 trillion bits, or 1 with 12 zero's after it (1,000,000,000,000). But why is it needed now and why is it important? The way we do business has changed, and the threat landscape along with it. Mobile computing, public and private cloud services, social media, everything-as-a-Service, and Big Data. These trends mean the firewall cannot become a bottleneck, and the bar has to constantly be raised higher and higher. The new FortiGate-5144C... [Read More]
by RSS Tamir Hardof  |  Jul 23, 2014  |  Filed in: Industry Trends & News
These days, IT complexity is a way of life - and something that most have come to accept as normal. Let's face it, it's well established that the typical enterprise user utilizes a multitude of devices at any given time throughout the work day. These devices are continuously exchanging information from numerous locations while using application data across hybrid cloud infrastructures. As a result, organizations are in the process of perfecting a precarious balancing act that both provides seamless unified access while simultaneously dodging the... [Read More]
by RSS Stefanie Hoffman  |  Oct 31, 2013  |  Filed in: Industry Trends & News