Results for wireless

Business and Technology | Threat Research

WPA2 Has Been Broken. What Now?

On Monday morning it was announced that WPA2, WiFi’s most popular encryption standard, had been cracked. A new attack method called KRACK (for Key Reinstallation AttaCK) is now able to break WPA2 encryption, allowing a hacker to read information passing between a device and its wireless access point using a variation of a common – and usually highly detectable – man-in-the-middle attack. If successful, this vulnerability can potentially allow a hacker to spy on your data as well as gain access to unsecured devices sharing the...

By Bill McGeeOctober 16, 2017

Industry Trends

IoT Security: Trickier Than You Think

In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new digital marketplace. Part of this digital transformation is the adoption of IoT devices and networks, which continue to be deployed in networks at an unprecedented rate.

By Phil Keeley, Peter NewtonSeptember 13, 2017

Industry Trends

Channel Focus: Solving Security’s Growing Pains with Scalability

Going wireless with a customer’s network and cloud was once a leap. Now it’s simply the next step. According to Cisco’s latest Global Cloud Index, 92% of workloads will be processed in cloud data centers by 2020, and research from IDG shows worldwide spending on public cloud service will grow to more than $141B by 2019. As the use of the cloud grows, however, the potential attack surface becomes substantially larger and organizations are exposed to new risks. But that’s not all. While technology is evolving, so are customer...

By Amy ThompsonMarch 31, 2017

Industry Trends

5 Network Security Challenges That Will Keep Financial Services CIOs On Alert in 2017

The financial services industry was a primary target for cybercriminals in 2016, and due to the value of its data, it will remain in the crosshairs as we embark on 2017. As a result, financial services CIOs will be faced with security decisions and challenges that will likely keep them up at night. While this isn’t an exhaustive list of challenges CIOs will face in the coming year, we’ve outlined several challenges we believe nearly all financial services organizations will have to face in 2017. Let’s take a closer look. 1....

By Brian Forster March 16, 2017

Industry Trends

The Move to Consolidation and Integration: Simplifying Security in Financial Services

In meeting with large financial institutions, the single biggest thing we keep hearing about is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-person transactions to a fully digital business model, the industry’s networks have evolved as well, become increasingly complex and more difficult to defend. During this evolution, as new threats have emerged, financial organizations have gone out and purchased a host of different security products, often from different vendors,...

By Bart RichardsJanuary 23, 2017

Threat Research

Home Routers - New Favorite of Cybercriminals in 2016

Fortinet has been monitoring the outbreak of attacks targeting home routers over the past several months. We plan to post a series of blogs to share our findings. In this post, we review the related statistical data that has been recorded by Fortinet. Since July of this year, it has not been uncommon for signatures detecting vulnerabilities in home routers to take up three spots in our daily top 10 IPS detection list. An analysis of these three signatures is provided below. 1. Netcore.Netis.Devices.Hardcoded.Password.Security.Bypass The...

By Bing LiuOctober 12, 2016

Threat Research

Next Gen Lock: the Good, the Bad, and the Smart, Part II: Fortinet Analysis

Part II: Fortinet Analysis Developing our own opinion In part one of this two-part series, I provided an overview of smart lock technology and some of its vulnerabilities and risks. We also decided to ‘try our luck’ with the security of these solutions in the Fortinet FortiGuard Lab, so we ordered some random brand smart locks for testing. Two of our main vulnerability researchers, Tony Loi and Tien Phan, were able to do some in-depth analysis these last few weeks. Not only were they able to confirm the attacks demonstrated by...

By David MaciejakOctober 07, 2016

Threat Research

Next Gen Lock: the Good, the Bad, and the Smart, Part I: The Problem

Part I: The Problem About 4000 years ago, as we began the development of our modern way of life, people started to also want their own privacy and the ability to safeguard their possessions. The lock and key concept was created at that time. The first were made with hardwoods, then metals. Some were amazingly intricate. But eventually, they evolved to become the latest iteration of that ancient concept, something we have seen developing over the last few years: the smart lock. The key has been replaced by your smartphone or smartwatch, but the...

By David MaciejakOctober 06, 2016

Industry Trends

As Your Company Goes Increasingly Wireless, How Do You Protect Your Network?

Back in June, we talked to Fortinet’s Doug Ramos about issues and trends affecting enterprise wireless environments today. We followed up with Doug to discuss how the growth of wireless devices and enterprise applications affects the way you design your wireless network, and how you control access. Q & A with Douglas Ramos As the device landscape shifts from corporate-owned to employee-owned, and as network usage shifts to an ever-greater reliance on wireless, what are the challenges for security? Wireless is the primary access...

By John WeltonSeptember 02, 2016

Industry Trends

Innovation Insights: Filling IoT Connectivity and Security Gaps

We’ve all heard about the growing proliferation of IoT devices. They are a critical component of the new digital economy, collecting and sharing information about a myriad of things - from smart appliances, irrigation systems, and shipping containers, to wireless energy meters, and mobile healthcare devices. The information they collect allows for more efficient inventory and manufacturing management, and can be mined for competitive advantages for everything like knowing that you need to immediately produce more green, left-handed widgets,...

By John MaddisonAugust 29, 2016