iot | Page 2


Fortinet will be showcasing our IoT security solutions at Telstra Vantage™ at the Melbourne Convention & Exhibition Centre this coming September 20th-21st in Booth # S08. The Internet of Things (IoT) is not new a concept, yet in recent years IoT has gained mass popularity. Conversations range from how IoT can improve our daily lives to how it can improve efficiency, or innovate and transform businesses - from the services offered to improving the ways a business operates. Unfortunately, today we are being constantly confronted with... [Read More]
by RSS Toan Trinh  |  Sep 13, 2017  |  Filed in: Industry Trends
In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new digital marketplace. Part of this digital transformation is the adoption of IoT devices and networks, which continue to be deployed in networks at an unprecedented rate. [Read More]
by RSS Phil Keeley, Peter Newton  |  Sep 13, 2017  |  Filed in: Industry Trends
Welcome back to our monthly review of some of the most interesting security research publications. July was very busy with the annual DEFCON and BlackHat US conferences, but also RMLL, the Worldwide Free Software Meeting held this year in France. Past editions: June 2017 May 2017 April 2017 March 2017 Elie Burzstein et al, How We Created the First SHA-1 collision and what it means for hash security video, DEFCON 25 slides and paper With the nickname "Crypto Girl", I obviously had to listen to this... [Read More]
by RSS Axelle Apvrille  |  Sep 07, 2017  |  Filed in: Security Research
There are countless examples of companies and industries that failed to adapt to technological disruptions at their outset, and as a result have become obsolete. When was the last time you left your home to rent a movie? Fifteen years ago, Blockbuster was a movie rental giant. However, they did not adapt well to the demands of the digital age. Companies like Netflix created online portals and shipped movies to customers, and then moved to online streaming. By the time Blockbuster got on board with this digital shift, it was too late. Today, the... [Read More]
by RSS Joseph Sykora  |  Sep 06, 2017  |  Filed in: Business and Technology
The 13th annual Hacks In Taiwan Conference (HITCON) took place August 25th and 26th at Academia Sinica, Taiwan’s national academy located in Taipei. Elite cyber security researchers from across the world gather at this annual conference to share their research and exchange ideas about the global threat landscape. Approximately 1000 people registered for the conference and, according to one of the HITCON crewmembers we met, one third of the attendees were undergraduates and fresh graduates. This is a good sign, given... [Read More]
by RSS Wayne Chin Yick Low and Yongjian Yang  |  Sep 05, 2017  |  Filed in: Security Research
Fortinet just released its Global Threat Landscape Report for Q2. Much of the data it provides is just what you’d expect. For example, FortiGuard Labs detected 184 billion total exploit attempts in Q2 from 6,300 unique and active exploits. Not only is this is an increase of 30% over Q1, with the growth of IoT and Shadownet resources we expect these numbers to continue to rise dramatically. In addition, 7 in 10 organizations experienced high or critical exploits during the quarter. By any measure, these are alarming numbers.  [Read More]
by RSS Derek Manky  |  Aug 23, 2017  |  Filed in: Industry Trends, Security Research
Fortinet recently talked with Michael Dierickx, director of security engineering and information security officer, about Panasonic Avionics’ security priorities and the tools they use to keep customers’ information safe on today’s connected aircraft.  [Read More]
by RSS John Maddison  |  Aug 09, 2017  |  Filed in: Business and Technology, Security Q & A
In this final blog in the Rootnik series we will finish our analysis of this new variant. Let’s start by looking into the script shell rsh. Analysis of the script shell Through our investigation we are able to see how the script shell works: First, it writes the content of the file .ir into /system/etc/install-recovery.sh. The file install-recovery.sh is a startup script. When the android device is booted, the script can be executed. The following is the content of the file .ir. Next, it writes some files... [Read More]
by RSS Kai Lu  |  Jul 09, 2017  |  Filed in: Security Research
In part I of this blog, I finished the analysis of the native layer of a newly discovered Rootnik malware variant, and got the decrypted real DEX file. Here in part II, we will continue our analysis. A look into the decrypted real DEX file The entry of the decrypted DEX file is the class demo.outerappshell.OuterShellApp. The definition of the class OuterShellApp is shown below. Figure 1. The class demo.outerappshell.OuterShellApp We will first analyze the function attachBaseContext(). The following is the function aBC() in the class... [Read More]
by RSS Kai Lu  |  Jul 09, 2017  |  Filed in: Security Research
In the context of digital trust, effective cybersecurity can become an essential enabler of digital transformation. In other words, if organizations and users can’t trust their data, and trust that it is safe, they will not engage, and the Digital Economy will fail. [Read More]
by RSS Drew Del Matto  |  Jun 19, 2017  |  Filed in: Business and Technology