Category: Fortinet

Security 101: Two-Factor Authentication

Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…

Sandboxing Technologies, Techniques Get Another Look

Neil MacDonald, a vice president at Gartner, wrote in a blog last week the idea of sandboxing potentially malicious content and applications isn’t new, but interest in this type of approach – particularly on Windows desktops – is on the rise. A growing number of virtualization and abstraction techniques available on Windows, he wrote, create isolation to provide security separation. FortiGuard Labs describes sandboxing as a practice employed by security technology to separate running progra…

Insomni’hack 2013

Insomni’hack 2013 took place last week at Geneva and I had the opportunity to attend. Insomni’hack DAY 1 consisted of one day workshops on subjects ranging from “Linux exploitation” to “How to make sure your Pentest Report is never empty”. I had the chance to attend a workshop on “Practical ARM exploitation” given by black Steve (@s7ephen) and white Steve (Stephen Lawler)

Digital Attack on Korean networks: Wipers, Time-Bombs and Roman soldiers

On March the 20th, little after 2pm, several South Korean financial institutions and TV broadcasters networks were impacted by a destructive virus, which wiped hard drives of infected computers, preventing them to boot up upon restart. Since then, the team here has been up on the deck, dissecting the attack components. So far, here is what we’ve found out, that, to our knowledge, hasn’t been published anywhere yet: * The attack made use of two different droppers, in charge of d…

Deloitte Survey Finds Breaches Across Industries

A mid-February 2013 Deloitte Tech Trends poll of 1,749 business executives found more than one in four report their organizations were the victims of at least one cyber attack in the past year. Nine percent report multiple breaches, and 17 percent say they are not confident their organizations could detect an attack

Network World Security Landscape Video Podcast (March)

In this month’s Network World Security Landscape video podcast, reporter Keith Shaw speaks with Fortinet’s Derek Manky on trends he saw at this year’s RSA tradeshow, a new Claco cross platform botnet that’s migrating from the smartphones to PCs, the recent Evernote hack and the recent trend of companies migrating to two factor authentication.