Fortinet

FortinetSecurity

Deep Analysis of New Poison Ivy/PlugX Variant – Part II

Credit to Author: Xiaopeng Zhang| Date: Fri, 15 Sep 2017 12:50:00 +0000

This is the second part of the FortiGuard Labs analysis of the new Poison Ivy variant, or PlugX, which was an integrated part of Poison Ivy’s code. In the first part of this analysis we introduced how this malware was installed onto victim’s systems, the techniques it used to perform anti-analysis, how it obtained the C&C server’s IP&Port from the PasteBin website, and how it communicated with its C&C server.

Read More
FortinetSecurity

How Can SMB Practices Improve Healthcare Cybersecurity?

Credit to Author: Susan Biddle| Date: Fri, 15 Sep 2017 12:50:00 +0000

The healthcare sector has been under increasing attack from cybercriminals with a variety of tactics and motivations. In fact, cyberattacks targeting healthcare providers increased 63 percent in 2016. The increased attention cybercriminals are giving the healthcare space is not surprising. The protected health information and other personally identifiable information (PII) that healthcare practices store about their patients is exactly the type of data that is easily monetized. Once cybercriminals breach healthcare networks and exfiltrate patient…

Read More
FortinetSecurity

Browser Extensions: A New Threat?

Credit to Author: Minh Tran| Date: Thu, 14 Sep 2017 12:50:00 +0000

Introduction Recently, there have been a series of high profile attacks using browser extensions. Having dealt with this threat vector in the past, we here at FortiGuard Labs decided to conduct a large-scale study of browser extensions. Before diving into the results, we want to make a distinction between two seemingly similar browser technologies: browser plugins and browser extensions. Both are mechanisms that allow an end user to customize their browser to suit their needs, however there are some fine distinctions between them. The former…

Read More
FortinetSecurity

BlueBorne May Affect Billions of Bluetooth Devices

Credit to Author: Aamir Lakhani| Date: Thu, 14 Sep 2017 23:00:00 +0000

Bluetooth is one of the most widely deployed and used connectivity protocols in the world. Everything from electronic devices to smartphones uses it, as do a growing number of IoT devices. Now, a new Bluetooth exploit, known as BlueBorne, exploits a Bluetooth, making literally billions of devices potentially vulnerable to attack. BlueBorne is a hybrid Trojan-Worm malware that spreads thru the Bluetooth protocol. Because it includes worm-like properties, any infected system is also a potential carrier, and will actively search for vulnerable hosts….

Read More
FortinetSecurity

Addressing Security in an IoT World

Credit to Author: Toan Trinh | Date: Thu, 14 Sep 2017 03:00:00 +0000

Fortinet will be showcasing our IoT security solutions at Telstra Vantage™ at the Melbourne Convention & Exhibition Centre this coming September 20th-21st in Booth # S08. The Internet of Things (IoT) is not new a concept, yet in recent years IoT has gained mass popularity. Conversations range from how IoT can improve our daily lives to how it can improve efficiency, or innovate and transform businesses – from the services offered to improving the ways a business operates. Unfortunately, today we are being constantly confronted with…

Read More
FortinetSecurity

IoT Security: Trickier Than You Think

Credit to Author: Peter Newton| Date: Wed, 13 Sep 2017 12:50:00 +0000

In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new digital marketplace. Part of this digital transformation is the adoption of IoT devices and networks, which continue to be deployed in networks at an unprecedented rate.

Read More