Wireless network infrastructure – for anyone in business, it’s a necessary evil and, perhaps ironically, one that isn’t short on infrastructure. You need a controller and wireless routers or access points – lots of them – enabling wireless networks to join an existing wired network. You’ll have to invest in a site planner/survey tool, or risk incorrectly guessing where the APs should go
Microsoft Releases IE8 Fix-It Patch
Are you using Internet Explorer 8? If so, you need to read on
Finding Similarities and Differences at DEX Level
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One the samples was targeting a Japanese audience, while the other sample was for Korean end-users
Network World’s Security Threat Landscape – May 2013
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet’s Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks.
Cyberattack Tracker Zeroes in on Firewall Vulnerabilities
Deutsche Telekom’s interactive, real-time map of global cyberattacks reveals the bulk of recent attacks – 27.3 million in February alone – were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map’s revelations are significant.
Tragic Spam
Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
W32/Kryptik.AX!tr – A Masterful FTP Trojan
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code.
O-TTPS and You
At FortiGuard, we take our duty to protect our customers from threats, malware, zero-day exploits and other forms of cyberattacks very seriously.
Email, Privacy and You… a Look Inside SB 467
For geeks like me, 1986 was a great year… IBM unveiled their “PC Convertible laptop”, the “first MS-DOS virus, Brain,” was released, and the “Electronic Communications Privacy Act of 1986 (ECPA)” was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another.
Windows XP-iration
After April 08,2014, the Extended Support for Windows XP will expire and Microsoft will cease to issue any more updates or patches. It will have a significant impact on Windows XP users, particularly in terms of vulnerabilities and exploits. If you just bought a computer recently and it came with a copy of Windows 7 or 8, you don’t need to worry about Microsoft’s Windows XP expiration deadline.