Latest Posts | Page 143


This week it's no secret that the Fortinet team that has been hitting it pretty hard on the Adobe front. For San Jose, Calif.-based Adobe, Valentine's Day came with a bang when researcher Honggang Ren of Fortinet's FortiGuard Labs detected a total of seven out of nine critical vulnerabilities in Adobe's Shockwave Player 11.6.3.633 (CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, CVE-2012-0766) and earlier versions for both Windows and Mac OS X. According to Ren, the memory corruption vulnerabilities were... [Read More]
by RSS Stefanie Hoffman  |  Feb 17, 2012  |  Filed in: Industry Trends
Tags:
These days, healthcare organizations have their hands full when it comes to compliance. In addition to adhering to a slew of industry regulations, such as HIPAA and HITECH, designed to protect patients' confidential information, medical facilities of all sizes are also facing increasingly stringent requirements from the Payment Card Industry Data Security Standard. That's right—PCI. PCI DSS, a series of 12 rigorous and detailed mandates governing customer data protection, applies to any organization that runs or processes credit card information—and... [Read More]
by RSS Stefanie Hoffman  |  Feb 16, 2012  |  Filed in: Industry Trends
Tags:
Black Hat Europe 2012 is now a month away, and this year, Fortinet researchers are taking their place among the headliners with three presentations in the lineup. “An Attacker's Day Into Virology: Human vs Computer" : What do influenza and the Conficker worm have in common? A lot. Fortinet researchers Axelle Apvrille and Guillaume Lovet will delve into these questions in their presentation with a deep comparison of technical and biological virology. During their discussion, the researchers will examine virus behaviors such as infection methods... [Read More]
by RSS Stefanie Hoffman  |  Feb 15, 2012  |  Filed in: Industry Trends
Tags:
Third of our three part series on the Anatomy of a Crimeware Syndicate, as delineated by Derek Manky, Senior Security Strategist at Fortinet. In part one we discussed the fundamental infrastructure and hierarchy of a crimeware syndicate. Part two talked about the threat landscape and major botnet takedowns. Now part three looks at specific threats facing organizations and outlines what tools can be used to combat them. You often get what you pay for, and crimeware markets are no exception. Attackers looking for crimeware can expect to pay more... [Read More]
by RSS Stefanie Hoffman  |  Feb 13, 2012  |  Filed in: Industry Trends
Tags:
** Part two of our three part series Anatomy of a Crimeware Syndicate. In part one we talked about the hierarchy and operations of a crimeware syndicate. Today we’re going to talk about the threat landscape that sustains crimeware and part three will look at solutions organizations can implement to reduce their risk. ** Crimeware syndicates aren't going away anytime soon. In short, it’s way too profitable--crimeware equals high returns and almost zero risk for its creators. And up until now, approaches to mitigate or prevent crimeware... [Read More]
by RSS Stefanie Hoffman  |  Feb 10, 2012  |  Filed in: Industry Trends
Tags:
The first of a three-part series, delineated by Fortinet's Derek Manky, which closely examines crimeware syndicates' infrastructure, the current threat environment that sustains these underground networks and possible protection mechanisms for targeted organizations. It's no secret that cyber criminals have evolved from out-of-the-basement hackers to highly organized and efficient networks employing thousands of “workers” to achieve their criminal objectives. But the criminal underground had a little help. Thus, its not entirely surprising... [Read More]
by RSS Stefanie Hoffman  |  Feb 09, 2012  |  Filed in: Industry Trends
Tags:
Wasn't it to my surprise when a friend's son hit me up yesterday on Facebook chat. We don't usually chat so I was curious as to what was going on. Although he 1st asked how I was, he quickly said he needed help to post an ad on a popular french classifieds website, leboncoin.fr. Although suspicion rose immediately, as a security researcher, I was very curious to see where this was going to lead. The ad is for a car, and although he tells me to list the required fields so that he can give me all the requested information, my friend seems to have... [Read More]
by RSS Karine de Ponteves  |  Jan 27, 2012  |  Filed in: Security Research
Tags:
The following video clip instructs users how to setup FortiClient Lite on Android devices. The video includes explanations of the features of FortiClient Lite and how set the software up on both the Android and FortiGate devices. FortiClient Lite Android was released from beta in December 2011 and features SSL VPN connectivity. A question and answer forum can be found at: http://support.fortinet.com/forum/tt.asp?appid=6 Alternatively, users may ask questions directly from their Android device using the “Report a Problem” feature located... [Read More]
by RSS Derek Manky  |  Jan 11, 2012  |  Filed in: Security Research
Tags:
It was a busy year in the world of network security. The threat landscape is constantly changing and we try to keep you posted on what's going on with our FortiGuard blog. We've compiled our top 10 FortiGuard blog posts throughout 2011. Carrier IQ on Android - FAQ Android Malware Surges in 2011 Fortinet Security Minute for September 2011 Threat Landscape Midyear in Review Apple Plays Cat-and-Mouse Game with Mac Malware Makers World IPv6 Day Phishing 101 Stop Your Computer From Becoming a Zombie! 40th Anniversary of the Computer Virus What's... [Read More]
by RSS Rick Popko  |  Jan 09, 2012  |  Filed in: Security Research
Tags:
In this edition of Security Minute, Derek Manky, Fortinet’s senior security strategist, wraps up 2011 with his predictions of the type of network security threats we might see in 2012. Here’s a link to the full report for more detailed info: http://blog.fortinet.com/2012-threat-predictions/ [Read More]
by RSS Rick Popko  |  Jan 04, 2012  |  Filed in: Security Research
Tags: