Skip to Main Content

Fortinet

Latest Stories

Chinese Hackers Exploit Firewall Bug to Hit Targets With 'Coathanger' Malware

Chinese hackers breached 20,000 Fortinet FortiGate systems to run espionage campaigns against government targets in a scheme that was 'much more extensive than previously known.'

Fortinet logo

VPN Login Details Leaked for 500K Fortinet Accounts

Thousands of these accounts are for users located in the US and at least some are still valid.

By Matthew Humphries

Is the DMZ Dead? Not Quite

A demilitarized zone (DMZ) is a type of network segmentation that used to be mandatory for any organization connected to the internet. But the cloud has made a DMZ unnecessary for the majority of IT environments and here's why.

By Wayne Rash
Data Center Demilitarized Zone

A Peek Inside the Black Hat Network Operations Center

The default hotel network may be fine for a pet supply vendor conference, but Black Hat is a different story.

By Neil J. Rubenking
Black Hat NOC

Here's To Ten Years of Mobile Malware!

Fortinet strolls down mobile malware memory lane to commemorate the tenth anniversary of the world's first mobile phone malware.

By Abigail Wang
android tenth anniversary

FortiClient 5.0 Review

3.0

Although it's designed to work with a network appliance, FortiClient 5.0 also functions as a standalone antivirus, with parental control and VPN client thrown in. And it's free!

By Neil J. Rubenking
FortiClient 5.0

Many Security Suites Improve Protection in Real-World Test

Over half of the security suites included in the latest whole product dynamic test report by AV-Comparatives earned a better rating than in the previous report, some of them quite a lot better. This ongoing labor-intensive test series simulates the actual user experience as closely as possible.

By Neil J. Rubenking
AV-Comparatives Test Lab

Advanced Persistent Threats Rare, But We're Still Unprepared

Yesterday, Fortinet released a new report on Advanced Persistent Threats—the big, scary attacks that haunt the dreams of security wonks. The good news is that APTs and their tactics are still rare, but the bad news is that organizations need to do more to protect themselves.

By Max Eddy
Image via Flickr user youngthousands

Microsoft Passes Antivirus Test, But Just Barely

Microsoft has received embarrassingly low scores in a number of recent independent lab tests. Thanks to a change in procedure, Microsoft finally achieved certification by AV-Test, but just barely.

By Neil J. Rubenking
Protection Performance Usability

A Peek At The Future Of Botnet Evolution

Botnet authors have new targets in mind as they continue to update their malware to keep up with the latest tech.

By Jamie Cifuentes
Botnets vs. Internet Security

Rent, Buy, or Lease? Exploit Toolkits A La Carte

Gone are the days when cybercrime was a pastime of mischievous teenagers. Cybercrime has evolved into complex enterprises complete with leaders, engineers, infantry, and money mules. Mirroring legitimate businesses, cybercrime organizations follow the fundamental laws of economics. In order to make profit, organizations price their products or services based on demand.

By Jamie Cifuentes
Rent, Buy, or Lease? Exploit Toolkits A La Carte

Going After Affiliate Networks, Malware's Achilles' Heel

At the RSA conference, there was a lot of talk about affiliate networks—that is, the people and companies who knowingly or unknowling help spread malware, build botnets, and make nefarious activities possible and profitable for the individuals operating these endeavors. While these affiliates have helped make malware more dangerous, they could also be the key to shutting down the bad guys.

By Max Eddy
via Wikipedia user Dr.K