wireless


On Monday morning it was announced that WPA2, WiFi’s most popular encryption standard, had been cracked. A new attack method called KRACK (for Key Reinstallation AttaCK) is now able to break WPA2 encryption, allowing a hacker to read information passing between a device and its wireless access point using a variation of a common – and usually highly detectable – man-in-the-middle attack. If successful, this vulnerability can potentially allow a hacker to spy on your data as well as gain access to unsecured devices sharing the... [Read More]
by RSS Bill McGee  |  Oct 16, 2017  |  Filed in: Business and Technology, Security Research
In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new digital marketplace. Part of this digital transformation is the adoption of IoT devices and networks, which continue to be deployed in networks at an unprecedented rate. [Read More]
by RSS Phil Keeley, Peter Newton  |  Sep 13, 2017  |  Filed in: Industry Trends
Going wireless with a customer’s network and cloud was once a leap. Now it’s simply the next step. According to Cisco’s latest Global Cloud Index, 92% of workloads will be processed in cloud data centers by 2020, and research from IDG shows worldwide spending on public cloud service will grow to more than $141B by 2019. As the use of the cloud grows, however, the potential attack surface becomes substantially larger and organizations are exposed to new risks. But that’s not all. While technology is evolving, so are customer... [Read More]
by RSS Amy Thompson  |  Mar 31, 2017  |  Filed in: Industry Trends
The financial services industry was a primary target for cybercriminals in 2016, and due to the value of its data, it will remain in the crosshairs as we embark on 2017. As a result, financial services CIOs will be faced with security decisions and challenges that will likely keep them up at night. While this isn’t an exhaustive list of challenges CIOs will face in the coming year, we’ve outlined several challenges we believe nearly all financial services organizations will have to face in 2017. Let’s take a closer look. 1.... [Read More]
by RSS Brian Forster  |  Mar 16, 2017  |  Filed in: Industry Trends
In meeting with large financial institutions, the single biggest thing we keep hearing about is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-person transactions to a fully digital business model, the industry’s networks have evolved as well, become increasingly complex and more difficult to defend. During this evolution, as new threats have emerged, financial organizations have gone out and purchased a host of different security products, often from different vendors,... [Read More]
by RSS Bart Richards  |  Jan 23, 2017  |  Filed in: Industry Trends
Fortinet has been monitoring the outbreak of attacks targeting home routers over the past several months. We plan to post a series of blogs to share our findings. In this post, we review the related statistical data that has been recorded by Fortinet. Since July of this year, it has not been uncommon for signatures detecting vulnerabilities in home routers to take up three spots in our daily top 10 IPS detection list. An analysis of these three signatures is provided below. 1. Netcore.Netis.Devices.Hardcoded.Password.Security.Bypass The... [Read More]
by RSS Bing Liu  |  Oct 12, 2016  |  Filed in: Security Research
Part II: Fortinet Analysis Developing our own opinion In part one of this two-part series, I provided an overview of smart lock technology and some of its vulnerabilities and risks. We also decided to ‘try our luck’ with the security of these solutions in the Fortinet FortiGuard Lab, so we ordered some random brand smart locks for testing. Two of our main vulnerability researchers, Tony Loi and Tien Phan, were able to do some in-depth analysis these last few weeks. Not only were they able to confirm the attacks demonstrated by... [Read More]
by RSS David Maciejak  |  Oct 07, 2016  |  Filed in: Security Research
Part I: The Problem About 4000 years ago, as we began the development of our modern way of life, people started to also want their own privacy and the ability to safeguard their possessions. The lock and key concept was created at that time. The first were made with hardwoods, then metals. Some were amazingly intricate. But eventually, they evolved to become the latest iteration of that ancient concept, something we have seen developing over the last few years: the smart lock. The key has been replaced by your smartphone or smartwatch, but the... [Read More]
by RSS David Maciejak  |  Oct 06, 2016  |  Filed in: Security Research
Back in June, we talked to Fortinet’s Doug Ramos about issues and trends affecting enterprise wireless environments today. We followed up with Doug to discuss how the growth of wireless devices and enterprise applications affects the way you design your wireless network, and how you control access. Q & A with Douglas Ramos As the device landscape shifts from corporate-owned to employee-owned, and as network usage shifts to an ever-greater reliance on wireless, what are the challenges for security? Wireless is the primary access... [Read More]
by RSS John Welton  |  Sep 02, 2016  |  Filed in: Industry Trends
We’ve all heard about the growing proliferation of IoT devices. They are a critical component of the new digital economy, collecting and sharing information about a myriad of things - from smart appliances, irrigation systems, and shipping containers, to wireless energy meters, and mobile healthcare devices. The information they collect allows for more efficient inventory and manufacturing management, and can be mined for competitive advantages for everything like knowing that you need to immediately produce more green, left-handed widgets,... [Read More]
by RSS John Maddison  |  Aug 29, 2016  |  Filed in: Industry Trends