Are you using Internet Explorer 8? If so, you need to read on
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
O-TTPS and You
At FortiGuard, we take our duty to protect our customers from threats, malware, zero-day exploits and other forms of cyberattacks very seriously.
Bitcoin and the ZeroAccess Botnet
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.
Email, Privacy and You… a Look Inside SB 467
For geeks like me, 1986 was a great year… IBM unveiled their “PC Convertible laptop”, the “first MS-DOS virus, Brain,” was released, and the “Electronic Communications Privacy Act of 1986 (ECPA)” was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another.
When is a Rogue AP not a Rogue AP?
One of the WORST riddles I can recall from my youth is, “When is a door not a door? When it’s ajar.” A riddle that’s also a pun?!… Seriously, who comes up with this
Spamhaus, Cyberbunker and the largest DDoS attack on Record
Botnet owners took a page out of Chef Emeril Legasse’s cookbook and ‘kicked it up a notch’ last week when they launched a massive Distributed Denial of Service (DDoS) attack on Internet spam fighter Spamhaus, content delivery provider CloudFlare and other Internet infrastructure providers. The Spamhaus Project provides blacklisting services to many ISPs and email servers around the world with the intent of stopping the billions of spam emails sent daily
Security 101: Two-Factor Authentication
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…
DDoS: A Brief History, Part II
In our last blog, we discussed DDoS, detailing the chronology of the DDoS attack from an early attack used by hackers to gain notoriety and wreak havoc to a sophisticated cybercrime tool used for monetary gain. In this Part II, gathered from information provided by FortiGuard AV analyst Karine de Ponteves, we discuss the latest iteration of DDoS – specifically, how the attack is leveraged to disrupt government and corporate systems to make a political statement and mobilize users to action –…
DDoS: A Brief History
Distributed-denial-of-service (DDoS) attacks have been the tool of choice for cybercriminals since the dawn of the Internet. Why