Twitter
LinkedIn
RSS

Posts Tagged ‘industry’


Changes in the Asprox Botnet

Asprox, a.k.a. Zortob, is an old botnet that was uncovered in 2007. It is known to spread by arriving as an attachment in spam emails that purport to be from well-known companies

Read More...

Security Digest: July 26th

You Can Learn More About the Fortinet Product Line By Going to www.FirewallShop.com/Fortinet The original article/video can be found at Security Digest: July 26th

Read More...

Want Everybody to Know You’re Flirting? This App is For You!

Once again, SherlockDroid/Alligator spotted a potentially unwanted application for us. The application is a Chinese flirting social networking application whose security level is distressingly low. We detect it as Riskware/Blued!Android.

Read More...

going to #BlackHat USA 2014? reach out to chat with @dmonnier, he's there on Wednesday, to hear how we can help you

2 retweets 2 favorites

Read More...

Webinar Follow-up: “Reverse Engineering Malware: A Look Inside Operation Tovar”

9 retweets 8 favorites

Read More...

Now, Chinese hackers extend reach to smaller US agencies like the GAO and Government Printing Office

4 retweets 7 favorites

Read More...

Is use-after-free exploitation dead? The new IE memory protector will tell you

The Isolated Heap for DOM objects included in the Microsoft Patch Tuesday for June 2014 was just a fire drill aimed at making the exploitation of use-after-free (UAF) vulnerabilities more difficult. The patch for July 2014, however, has been quite a shock to exploit developers! In this release, Microsoft showed some determination in fighting back against UAF bugs with this improvement – the introduction of a new memory protector in Microsoft Internet Explorer, which would make exploitation of…

Read More...

Hungry, Hungry Botnets: A look at Torpig

Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don’t think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thrives on our carefree downloading reflex. Say hello to Torpig

Read More...

Pay-as-You-Go Security With AWS

Just a few short months ago, Fortinet had a major milestone for public cloud computing with the release of our flagship FortiGate security solution on Amazon Web Services environments. Security and privacy continue to be a top issues, if not the #1 concern, for enterprises looking to move servers and workloads to efficient public cloud infrastructure

Read More...

Fortinet's News and Threat Research Security Digest: July 5

3 retweets 3 favorites

Read More...