There’s no shortage of reports on the latest network security breaches. Each incident holds its own valuable security lesson but it’s beneficial to recognize the incremental successes paving the way to progress. That’s exactly what Reuven Harrison of Fortinet’s solution partner Tufin did in a blog published last week.
Sophos UTM 9.100 Technical Notification
Sophos UTM version 9.1 was made Generally Available to all customers last week and thousands of customers have already successfully upgraded and begun to benefit from all the new features.
What’s Next in Next-Gen Firewalls and Testing (3 Minute Video)
Advanced Targeted Attacks. Botnets
Sophos UTM 9.1 Released
I am pleased to inform you that today, after months of research, development, (and public testing by you), we have released Sophos UTM 9.1. This major update to our UTM line introduces dozens of new features, offers vastly increased performance in throughput and reporting (to name a few), and all-told makes UTM an even more formidable solution
Finding Similarities and Differences at DEX Level
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One the samples was targeting a Japanese audience, while the other sample was for Korean end-users
IDC BYOD Survey Shows Mobile Malware is the Top Concern
Just a few years ago, the bring-your-own-device (BYOD) to work trend was just starting to give IT administrators cause for concern. Flash forward to today: BYOD has not only reached a tipping point, but is accelerating at a dizzying pace. With this momentum comes elevated fears and a torrent of threats, proven by the latest BYOD and mobility figures from research firm IDC in its Mobile Security Survey 2013.
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
Bitcoin and the ZeroAccess Botnet
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.
DDoS: A Brief History, Part II
In our last blog, we discussed DDoS, detailing the chronology of the DDoS attack from an early attack used by hackers to gain notoriety and wreak havoc to a sophisticated cybercrime tool used for monetary gain. In this Part II, gathered from information provided by FortiGuard AV analyst Karine de Ponteves, we discuss the latest iteration of DDoS – specifically, how the attack is leveraged to disrupt government and corporate systems to make a political statement and mobilize users to action –…
Digital Attack on Korean networks: Wipers, Time-Bombs and Roman soldiers
On March the 20th, little after 2pm, several South Korean financial institutions and TV broadcasters networks were impacted by a destructive virus, which wiped hard drives of infected computers, preventing them to boot up upon restart. Since then, the team here has been up on the deck, dissecting the attack components. So far, here is what we’ve found out, that, to our knowledge, hasn’t been published anywhere yet: * The attack made use of two different droppers, in charge of d…