firewalls


Malware has been known to use new and innovative ways to evade detection by Antivirus software, a phenomenon AV analysts have often seen with PC malware. Not a lot of examples of the same have been seen employed by mobile malware. A recently discovered Android malware has brought to light one such Antivirus evasion technique with its use of "a legitimate firewall to thwart security software". The legitimate firewall referred to is iptables which is a well-known "administration tool for IPv4 packet filtering and NAT" on... [Read More]
by RSS Ruchna Nigam  |  Jan 21, 2016  |  Filed in: Security Research
When I was "the tech guy" (and a math and science teacher and the Drama Club Advisor) at our local high school, I often said that if our students devoted as much time to their studies as they did to trying to bypass our content filter, we'd have a bunch of Rhodes Scholars. It only got worse when I made the mistake of getting into administration as the district's first technology director. Not only did I dramatically increase bandwidth at all of our schools, making the Internet a much more attractive place to look for trouble, but... [Read More]
by RSS Chris Dawson  |  Dec 11, 2015  |  Filed in: Industry Trends
I was recently made aware of a thread on a competitors forum that asked for "honest" advice on whether they should abandon their current firewall technology and adopt FortiGate firewalls instead. The vendor "X" in question was one that I have previously held a close relationship; so I have unique insight into the relative strengths and weakness of both technologies. For reasons of not wanting my door kicked down by the lawyers of two major networking companies, I held my tongue and didn't engage in the conversation. However, this thread led me to... [Read More]
by RSS Glen Kemp  |  May 26, 2014  |  Filed in: Business and Technology
Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends