FortiGuard Labs | Page 4


There are a lot of trends and conversations being explored at this year's RSA Conference in San Francisco, CA. Among the most talked about is just how vulnerable businesses are when there is no protection around social media usage by employees. While this topic can certainly set off controversy, it doesn’t necessarily have to if you have the right security strategy in place. Digital Strategist Jonas Tichenor speaks with Fortinet Security Strategist Richard Henderson about social media and ways to keep your organization safe. [Read More]
by RSS Jonas Tichenor  |  Apr 22, 2015  |  Filed in: Industry Trends
As FortiGuard Labs discloses another WordPress Plugin XSS vulnerability, it’s time to think about CMS security. According to W3Techs, WordPress powers nearly 24% of all websites. There is a reason that it enjoys close to a 61% market share among content management systems: It is incredibly easy to set up and use It is actively maintained and updated A huge user community is there for support even if you don’t pay a host or service provider to support it The ability to easily customize and extend it with plugins, themes,... [Read More]
by RSS Chris Dawson  |  Mar 24, 2015  |  Filed in: Security Research
[Read More]
by RSS Michael Perna  |  Aug 23, 2014  |  Filed in: Industry Trends
Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don't think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thrives on our carefree downloading reflex. Say hello to Torpig. A "drive-by download" is when a website suddenly prompts you to do something, such as a "click here to close this ad." Many unsuspecting web surfers simply hit yes. Distributed mainly by drive-by download, the Torpig (or Sinowal) Trojan... [Read More]
by RSS Michael Perna  |  Jul 16, 2014  |  Filed in: Industry Trends
This month on the security threat landscape, our very own Derek Manky made a visit to Network World in Boston to discuss in-person, with Keith Shaw, the FIRST conference and all the latest trends in the threat landscape. [Read More]
by RSS Michael Perna  |  Jun 30, 2014  |  Filed in: Security Research
Safe enough to say, the recently introduced Cyber Intelligence Sharing and Protection Act, also known as CISPA--now making its way through the U.S. Senate--has generated enough controversy to place itself squarely into the proverbial hornet’s nest over the last several months regarding its consumer information sharing policies. If enacted, CISPA, which passed in the House of Representative with a sizeable majority, aims to accelerate the free flow of confidential information shared between the U.S. government, technology companies and... [Read More]
by RSS Stefanie Hoffman  |  May 25, 2012  |  Filed in: Industry Trends
A couple of days back, a game of Nerd Truth or Dare in the lab led to the shocking revelation that most of us were using our Facebook/Twitter accounts mainly to keep up with security blogs. Personally, being a twitter non-conformist until recently, I even created a twitter account for this sole purpose. And that led to the realization that FortiGuard Labs need to 'get with it' too. So here's introducing our Facebook and Twitter pages for your ease of following us. If you, like us, have tried every RSS aggregator there is under the sun, have been... [Read More]
by RSS Ruchna Nigam  |  Jun 20, 2011  |  Filed in: Security Research
It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's... [Read More]
by RSS Derek Manky  |  Apr 12, 2011  |  Filed in: Security Research