Fortinet

FortinetSecurity

A Closer Look at the Rapid Evolution of EHR Security

Credit to Author: Susan Biddle| Date: Tue, 21 Mar 2017 08:21:27 -0700

More than any other database containing sensitive information for a large quantity of people, electronic health records (EHRs) are an especially attractive target for hackers. The patient data they hold can be used for financial gain, as recent reports show that stolen healthcare databases are being sold on the deep web for as much as US$500,000. But we’ve also seen a number of instances where large data breaches have occurred at the hands of state actors looking to collect data for espionage purposes. No matter the reasoning behind…

Read More
FortinetSecurity

Grabbot is Back to Nab Your Data

Credit to Author: David Wang and He Xu| Date: Fri, 17 Mar 2017 10:59:31 -0700

Introduction Fortinet recently discovered a new botnet capable of stealing large amounts of user information, as well as remotely manipulating compromised machines. The malware appears to be based on an older botnet known as Grabbot, which was first discovered back in November of 2014[1]. This new variant improves on that existing functionality while adding several dangerous new features. This blog aims to offer a quick insight into how Grabbot functions. Replication The bot can be found hosted on a number of compromised websites with a…

Read More
FortinetSecurity

Blockchain and Financial System Impact

Credit to Author: Keith Rayle| Date: Fri, 17 Mar 2017 07:50:01 -0700

Blockchain is a technology that basically distributes a ledger. For those of you in the financial management world, you know a ledger as the trusted source of transactions or facts. The same is true with blockchain. But instead of existing in a large leather bound tome or in a financial management application, blockchains are managed by a distributed set of computing resources working together to maintain that ledger. Each transaction, or block within it, is linked together in an indisputable manner using public/private key encryption and internal…

Read More
FortinetSecurity

5 Network Security Challenges That Will Keep Financial Services CIOs On Alert in 2017

Credit to Author: Brian Forster | Date: Thu, 16 Mar 2017 09:04:50 -0700

The financial services industry was a primary target for cybercriminals in 2016, and due to the value of its data, it will remain in the crosshairs as we embark on 2017. As a result, financial services CIOs will be faced with security decisions and challenges that will likely keep them up at night. While this isn’t an exhaustive list of challenges CIOs will face in the coming year, we’ve outlined several challenges we believe nearly all financial services organizations will have to face in 2017. Let’s take a closer look. 1….

Read More
FortinetSecurity

FortiMail named IDC Email Security Leader

Credit to Author: Carl Windsor| Date: Wed, 15 Mar 2017 11:05:56 -0700

As a product manager, the start of the year is a time to take a few breaths and reflect on the successes or failures of the past year and plan for future projects.  When we have invested so much effort into our products, we know their strengths, but spending so much time in such close proximity to a solution can also make one a bit blinkered. Which is why it is always important to get outside opinions on your progress as a sanity check. Of course, customer feedback is essential, and always very welcome, but it was particularly satisfying to…

Read More
FortinetSecurity

Teardown of Android/Ztorg (Part 2)

Credit to Author: Axelle Apvrille| Date: Wed, 15 Mar 2017 08:21:55 -0700

In the part 1 of this blog, we saw that Android/Ztorg.AM!tr silently downloads a remote encrypted APK, then installs it and launches a method named c() in the n.a.c.q class. In this blog post, we’ll investigate what this does. This is the method c() of n.a.c.q: This prints "world," then waits for 200 seconds before starting a thread named n.a.c.a. I'll spare you a few hops, but among the first things we notice is that the sample uses the same string obfuscation routine, except this time it is not…

Read More