cybersecurity | Page 10


Your 2017 Safe Holiday Shopping Guide: We will soon be in the throes of the holiday gift-buying season. A whole set of must-have connected devices have hit the stores, from smart accessories and appliances, to game consoles and online games, to web-enabled toys. And we will be buying many of them online, especially on cyber Monday. Are you ready? You are scouting online shopping websites, loading apps that automatically scan sites and compare prices to make sure you are getting the best deal, building your shopping lists, and checking your... [Read More]
by RSS Anthony Giandomenico  |  Nov 25, 2016  |  Filed in: Industry Trends
Smart cities are being planned the world over. Technology development always goes through two phases for any new discipline: first – tools are developed, and infrastructure is built and enabled. And second – the technology is scaled up. In the case of smart cities, we are in the first phase, where many of the kinks and challenges are still being ironed out. Here are some examples of services a smart city might provide: Coordinated energy control of air conditioners at homes during hot summer days to manage and preserve city... [Read More]
by RSS Hemant Jain  |  Nov 24, 2016  |  Filed in: Industry Trends
A High-Severity Heap Buffer Overflow vulnerability was recently fixed in a patch  by Openssl Project.  This vulnerability affects the remote SSL servers that support the ChaCha20-Poly1305 cipher suite, and can be exploited to crash the SSL service. This High-Severity Heap Buffer Overflow vulnerability (CVE-2016-7054) is caused by an error when the ChaCha20-Poly1305 cipher suite is decrypting large amounts of application data. We will examine the root cause of this vulnerability in this post. The ChaCha20-Poly1305 cipher suite is... [Read More]
by RSS Dehui Yin  |  Nov 23, 2016  |  Filed in: Security Research
Your 2017 Safe Holiday Shopping Guide: Starting the Friday after Thanksgiving, millions of Americans will be braving the crowds and heading out to malls, big-box stores, and local merchants looking to take advantage of seasonal discounts. Are you ready? You are building your shopping lists, checking your credit card balances, scanning for can’t miss deals, and planning your shopping itineraries. You may have even installed new apps that can automatically scan and compare prices to make sure you are getting the best deal. But what about... [Read More]
by RSS Anthony Giandomenico  |  Nov 23, 2016  |  Filed in: Industry Trends
Our patent reward program open to all employees is a huge part of why Fortinet has reached another innovation milestone - more than 343 patents issued worldwide, with more pending. [Read More]
by RSS Darren Turnbull  |  Nov 22, 2016  |  Filed in: Business and Technology
With the growth and pervasiveness of online devices and digital tools, we reached a critical tipping point in 2016. The need for accountability at multiple levels is urgent and real and affects us all. If something isn’t done, there is a real risk of disrupting the emerging Digital Economy.   Even in recent weeks, IoT devices were hijacked to shut down a huge section of the Internet. Stolen documents were used in an attempt to influence the US presidential election. Ransomware began to reach epidemic proportions, including high... [Read More]
by RSS Derek Manky  |  Nov 21, 2016  |  Filed in: Industry Trends, Security Research
New variants of android banking malware target even more German banks, popular social media apps, and more Summary In my previous blog I provided a detailed analysis of a new android banking malware that spoofed the mobile applications of several large German banks to trick users into revealing their banking credentials. This week I found several new variants of this growing malware, and in this update I am sharing these new findings. Install the malware One of these variants masquerades as another German mobile banking app. Once installed,... [Read More]
by RSS Kai Lu  |  Nov 18, 2016  |  Filed in: Security Research
This was my first time at DefCamp in Romania, and it was definitely a good experience. DefCamp was an interesting mixture of not so technical talks (but with acute insights) and technical ones. Among the "not so technical" ones, I liked the following: Do Tinder bots dream of electric toys? Tinder is a match-making/dating application. Inbar Raz decided to test it. He created a profile according to online guidelines (images with animals, images looking official, etc.) and quickly got many matches. But...it turned out that they... [Read More]
by RSS Axelle Apvrille  |  Nov 18, 2016  |  Filed in: Security Research
Besides conference sessions, DefCamp 2016 also ran various competitions in the hacking village. I wandered about the critical infrastructure area - an amazing model kit of a train, station, and solar panels all controlled by Siemens and Schneider PLCs - but mostly, of course, at the _IoT village_. Critical Infrastructure village with model kit, PLCs, and SCADA supervision monitor   At the IoT village, several connected devices were available to be hacked: web cameras, a water sensor, a coffee maker...I lost some time on the Foscam... [Read More]
by RSS Axelle Apvrille  |  Nov 17, 2016  |  Filed in: Security Research
This post originally appeared as a byline in Dark Reading. For cyber intelligence sharing to work, organizations need two things: to trust each other, and better processes to collect, exchange, and act on information quickly. As cyberthreats become more sophisticated and expand to the Cloud and the Internet of Things, the sharing of meaningful threat intel between trusted organizations has become more critical than ever before.  At Fortinet this year, our teams witnessed the benefits of info sharing first hand as part of a joint... [Read More]
by RSS Derek Manky  |  Nov 17, 2016  |  Filed in: Industry Trends