Conversation hijacking and how to deal with it

Conversation hijacking and how to deal with it

Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations. Targeted e-mail attacks aren’t limited to spear phishing and business e-mail compromise (BEC). Another serious threat is conversation...
Fortinet’s Environmental Sustainability Efforts

Fortinet’s Environmental Sustainability Efforts

Earth Day was first proposed as an idea by U.S. Senator Gaylord Nelson, one of the leaders of the modern environmental movement, at a Seattle conference in 1969 as he called on the nation to join in. The following year, the first Earth Day took place, serving as an...
Attacks on virtualization systems and Linux servers

Attacks on virtualization systems and Linux servers

Ransomware. Nasty. But how to build defenses against it? Rather – what should be protected first and foremost? Often, Windows workstations, Active Directory servers, and other Microsoft products are the prime candidates. And this approach is usually justified. But we...