Latest Posts | Page 142


Are you using Internet Explorer 8? If so, you need to read on. A recent zero-day exploit being actively used in the wild and was likely the cause of a watering-hole attack that was launched from the US Department of Labor. To help IE8 users mitigate any further exposure to attacks from this flaw, Microsoft released a quick fix solution to address the exploit. Microsoft is still working on a complete fix for the exploit. In the interim, if you're using IE8, click here to head to Microsoft's website and scroll down to the Fix-It icon labelled "Enable". If... [Read More]
by RSS Richard Henderson  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
Machine-to-machine (M2M) communications applications are working their way beyond traditional utility, traffic control and telemedicine industries, as enterprises search for ways it can benefit their businesses despite some real risks. ZDNet's Tim Lohman recently penned an article about how the automated communication of data between connected devices, M2M, is envisioned more and more by CIOs as delivering real value, cost savings and innovation in management. Lohman says now that networking equipment (a simple SIM card or RFID chip, in the case... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Just a few years ago, the bring-your-own-device (BYOD) to work trend was just starting to give IT administrators cause for concern. Flash forward to today: BYOD has not only reached a tipping point, but is accelerating at a dizzying pace. With this momentum comes elevated fears and a torrent of threats, proven by the latest BYOD and mobility figures from research firm IDC in its Mobile Security Survey 2013. None of these statistics should come as a surprise. Mobile malware is a top concern among the majority (68 percent) of IT-controlled organizations.... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Access management is a crucial function for every organization with an Internet connectionand it's a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment. With this in mind, here are a few tips for access management that might ease the process. Do Inventory Organizations need to have strong, robust user access policies, and IT... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people's aid in the wake of the explosions. At FortiGuard, we've seen an uptick in bad guys trying to take advantage of people's desire to find our more by tailoring spam messages that when opened, will infect your machine with malware. Some of the spams have subjects like: "2 Explosions at Boston Marathon" and "Explosions at the Boston Marathon". It has links that... [Read More]
by RSS Raul Alvarez  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
At FortiGuard, we take our duty to protect our customers from threats, malware, zero-day exploits and other forms of cyberattacks very seriously. Our customers can sleep well knowing that 24 hours a day we are always on guard and stationed on the front lines keeping their networks safe and secure. The new Open Trusted Technology Provider Standard (O-TTPS) will help in protecting our customers. As stated in their publication: "The O-TTPS is an open standard containing a set of organizational guidelines, requirements, and recommendations for integrators,... [Read More]
by RSS Raul Alvarez  |  Jul 30, 2012  |  Filed in: Industry Trends
Tags:
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack. While the term APT is used with increasing frequency when discussing security threats, ISACA found there's still confusion as to what an APT is and how to manage the risks associated with it. The ISACA's Advanced Persistent Threat Awareness report, released in mid-February, includes input from 1,551 information security professionals representing 20 industries from across the globe. Fortinet defines APTs... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin. In the new Bitcoin heists, the botnets that take over a victim's computer aren't intended to steal a victim's money - although they are certainly capable of doing that, too. However, in the latest shenanigans, the malware compromises a computer... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends