Latest Posts | Page 133


Basic business missions and strategies can wind up lost in the endless array of enterprise network security threats, new technologies and tons of changing products and solutions for protecting networks. Deloitte principals Ted DeZabala and Irfan Saif, along with MIT research scientist George Westerman, wrote the article “Evolve or Fail,” asking enterprises whether their security capabilities are evolving with their business strategies. As operating environments become more complex, vulnerabilities are harder to manage. Increasing threat levels... [Read More]
by RSS Stefanie Hoffman  |  Feb 08, 2013  |  Filed in: Industry Trends
Tags:
Forget drawing your blinds and locking your doors. In the age of social networking, text messaging and instant messenger, you can have access to almost anyone with the click of a button. And, as anyone with a mobile device or a laptop can attest, it is by far more difficult to fend people off than it is to gain access. This fact is not lost on malware authors, who, by practically all reports, are having a field day. Case in point: Fortinet’s FortiGuard Labs researchers have discovered a new strain of malware that spreads via messaging applications... [Read More]
by RSS Stefanie Hoffman  |  Feb 08, 2013  |  Filed in: Industry Trends
Tags:
Android/Claco.A!tr is a new mobile malware that has been in the news recently for it's unique ability to infect PCs. Even though we've seen an attack vector of this kind on the Symbian OS before (SymbOS/CardTrap), this would be the first of it's kind on the Android platform. The malicious packages come under the names SuperClean and DroidCleaner and claim to be applications that can speed up your phone. Upon looking into the code, we realize that the "strategy" used to speed up the phone is to mainly restart the running applications. BOTNET... [Read More]
by RSS Ruchna Nigam  |  Feb 06, 2013  |  Filed in: Security Research
Fortinet's FortiGuard Threat Landscape Research Team Reports Four Samples of Money Making Malware to Watch for in 2013 Team Also Identifies an Increase in Mobile Advertising Malware Toolkits and in Hacktivist Web Server Vulnerability Scanning Article Link: http://goo.gl/jZzyu SUNNYVALE, CA--(Marketwire - Feb 4, 2013) - Fortinet® ( NASDAQ : FTNT ) -- a world leader in high-performance network security -- today announced the findings of its FortiGuard threat landscape research for the period of October 1 - December 31, 2012. FortiGuard® Labs... [Read More]
by RSS Rodney Mock  |  Feb 04, 2013  |  Filed in: Industry Trends
Tags:
True to numerous New Year’s security predictions, vulnerabilities are emerging as easy, low-hanging target for hackers. Flaws, vulnerabilities and exploits defined this week in security, hitting popular platforms such as Skype, Java and Android. Congress is again mustering its strength and dusting off ambitions to revisit another cybersecurity legislation fight. Here’s a look at the top stories of the week. Skype Bugs Hit With One-Two Punch This week, Skype got pummeled from all sides. The popular video chat application had a rough ride after... [Read More]
by RSS Stefanie Hoffman  |  Jan 31, 2013  |  Filed in: Industry Trends
Tags:
These days, one-seventh of the world’s population is on Facebook and hundreds of millions are on LinkedIN, Twitter and YouTube. For a business, that’s nothing short of a gold mine, and, as such, most organizations have jumped onto the social media bandwagon with both feet. Social media sites have evolved into accessible and cost-effective (free) mass-marketing tools designed to educate and promote goods and services. The problem occurs when more than one person or department is in charge of an organization’s access to those sites. Ideally,... [Read More]
by RSS Stefanie Hoffman  |  Jan 25, 2013  |  Filed in: Industry Trends
Tags:
The concept has been around since the dawn of time: Criminals steal something valuable to the victim, forcing them to hand over money, information or other coveted items to get it back. Ransomware applies this concept to cyber space. By definition, it’s a malware form of data stealing in which the attacker encrypts the victim’s information and demands payment for the decryption key. The malware shares numerous traits and follows the same trajectory as fake or rogue antivirus: Many ransomware programs come equipped with a professional-looking... [Read More]
by RSS Stefanie Hoffman  |  Jan 25, 2013  |  Filed in: Industry Trends
Tags:
Protecting against malware attacks armed with advanced malicious threat technologies requires much stronger network security threat prevention that just looking for static viruses that match a signature. It requires an intelligence-based structure that aggregates and correlates information from a variety of unified threat management sources. Learn more about Fortinet's Client Reputation in this video http://goo.gl/T7C7y [Read More]
by RSS Rodney Mock  |  Jan 24, 2013  |  Filed in: Industry Trends
Tags:
This solution brief describes how Fortinet's NGFW technology offers identification and control of applications running over your network, an integrated intrusion prevention system (IPS) with deep packet scanning capabilities, and the ability to verify a user or device’s identity and enforce access policies accordingly. Also, this document describes additional technologies that provide you with a real-time ranking of the security risk of devices on your network along with cloud-based threat detection and prevention Download Link: http:... [Read More]
by RSS Rodney Mock  |  Jan 22, 2013  |  Filed in: Industry Trends
Tags: ngfw
If you're looking to create a comprehensive approach to network security that includes everything from your mobile workers and remote offices to your headquarters and data centers, you'll need a security platform that is powerful, easy to manage and protects you from the latest threats. This seminar will discuss today's security threats and the technologies and techniques you'll need at the different levels of a distributed enterprise. The presentation will describe best practices for each of the following components of a distributed enterprise... [Read More]
by RSS Rodney Mock  |  Jan 22, 2013  |  Filed in: Industry Trends
Tags: webinar