Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
O-TTPS and You
At FortiGuard, we take our duty to protect our customers from threats, malware, zero-day exploits and other forms of cyberattacks very seriously.
W32/Kryptik.AX!tr – A Masterful FTP Trojan
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code.
APTs: One Layer Is Not Enough
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack.
Email, Privacy and You… a Look Inside SB 467
For geeks like me, 1986 was a great year… IBM unveiled their “PC Convertible laptop”, the “first MS-DOS virus, Brain,” was released, and the “Electronic Communications Privacy Act of 1986 (ECPA)” was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another.
Analyst Commentary – Security Appliance Growth Continues
There was a flurry of news articles out recently highlighting some interesting data points from IDC. In particular, according to IDC, worldwide factory revenue from security appliances was up 7.2% year on year to $2.3 billion, as unit shipments increased 5.2% to 538,428. Granted, Q4 is generally the strongest quarter in the tech industry, so it should be no surprise to most to see a strong finish to the year
When is a Rogue AP not a Rogue AP?
One of the WORST riddles I can recall from my youth is, “When is a door not a door? When it’s ajar.” A riddle that’s also a pun?!… Seriously, who comes up with this
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.
DDoS: A Brief History
Distributed-denial-of-service (DDoS) attacks have been the tool of choice for cybercriminals since the dawn of the Internet. Why
Digital Attack on Korean networks: Wipers, Time-Bombs and Roman soldiers
On March the 20th, little after 2pm, several South Korean financial institutions and TV broadcasters networks were impacted by a destructive virus, which wiped hard drives of infected computers, preventing them to boot up upon restart. Since then, the team here has been up on the deck, dissecting the attack components. So far, here is what we’ve found out, that, to our knowledge, hasn’t been published anywhere yet: * The attack made use of two different droppers, in charge of d…