antivirus


FortiGuard Labs has been actively monitoring FALLCHILL, validating all its IOCs (indicators of compromise), and providing protection for our customers. In a previous post we provided a high level overview of FALLCHILL. In this research report we dig even further, providing a deep dive analysis of the FALLCHILL Remote Administration Tool (RAT) in order to shed additional light on this threat, and thereby help our customer and the security community at large defend against this threat and similar threats. [Read More]
by RSS Minh Tran  |  Nov 28, 2017  |  Filed in: Security Research
Recently, we came across some interesting samples in jtd format, which is the file format used by JustSystems Ichitaro. The following is a quick primer for readers who are unfamiliar with the Japanese market. [Read More]
by RSS Minh Tran  |  Nov 09, 2017  |  Filed in: Security Research
Financial organizations can benefit from a change in thinking. Read this post to learn how thinking like a cybercriminal can prevent data breaches. [Read More]
by RSS Brian Forster  |  Sep 30, 2016  |  Filed in: Industry Trends
Ransomware is a category of malware that scrambles your files or lock your computer while asking for ransom.  We have encountered different versions of ransomware, and seen their effects.  We also have seen a different kind of ransomware that not only holds your computer for ransom, but also infects your files for persistency. Virlock is a ransomware that locks your screen for ransom, while infecting your files with its malicious code. Virlock is an interesting malware not only because it is a ransomware and file infector in one, but... [Read More]
by RSS Raul Alvarez  |  Jan 26, 2016  |  Filed in: Security Research
It was a morning like lots of others...I was headed to the airport for a week in our home office, so I got an early start, checked on the sheep on the way out (yes, sheep), and got on the road. Aside from being ridiculously early, the ride was uneventful until I got to my exit for the Mass Pike. That's I-90 for those of you outside Massachusetts and, when traffic is good (like at 4:30 in the morning), it's the fastest, easiest way to the airport. And the exit was closed. Well darn. I had Google Maps running, not because I didn't know... [Read More]
by RSS Chris Dawson  |  Sep 28, 2015  |  Filed in: Industry Trends
Traditional client AV has been plagued with problems relating to performance, updates, and effectiveness. A new generation of endpoint protection is changing the game. Antivirus software has not exactly been a favorite of either users or administrators for some time. Consumer PCs usually come with at least a trial of antivirus software but BYOD and a growing number of mobile endpoints has left IT in a pinch: How do you ensure that every employee’s phone, laptop, tablet, and/or desktop is adequately protected, especially when they aren’t... [Read More]
by RSS Chris Dawson  |  Apr 29, 2015  |  Filed in: Industry Trends
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Web Filtering is one of your first lines of network defense, preventing known threats from reaching your network so your other security features can handle the unknown threats, and preventing users from accessing content that could be distracting, a drain on bandwidth, or a liability risk. Below is a collection of videos to introduce you to Web Filtering, using FortiOS 5.0. User-specific Web Filtering This video introduces you to the concept of web filtering, and provides an example of how it can be used to grant or limit access based on user... [Read More]
by RSS Jonah Davidson  |  May 08, 2014  |  Filed in: Security Q & A
Intrusion prevention system, or IPS, is like the secret ingredient in a favorite recipe -- it is rarely consumed by itself, but most security suites and Unified Threat Management devices wouldn't be considered complete without it. In fact, it's often taken for granted. IPS is a vital component of any comprehensive security solution and a necessary part of a compliance-driven environment. And while it is one of the most traditional security solutions on the market, its features continue to evolve to tackle a maelstrom of modern attacks. Essentially... [Read More]
by RSS Stefanie Hoffman  |  Nov 13, 2013  |  Filed in:
You ran all the scans, conducted all the tests and yep…you've got malware Last month, we detailed steps you could take in those critical and panic-filled moments when you realized that you might have clicked on a malicious link or opened an infected attachment, but weren’t quite sure you’d been infected. Now, in a follow-up, we'll note a few actions you can take in the event that malware was indeed installed on your computer. First, nothing substitutes for the expertise of an IT professional for an accurate assessment of your computer’s... [Read More]
by RSS Stefanie Hoffman  |  May 02, 2012  |  Filed in: Industry Trends