Tag Archives: mobile security

WatchGuard Product Releases

WatchGuard recently announced the General Availability of major new releases of both the Fireware operating system and WatchGuard Dimension, both of which are now available to download at the software center. These releases provide increased visibility across the entire network for distributed enterprises and small and midsize businesses (SMBs). I was in Europe last week at a number of WatchGuard events and I heard a lot of positive reaction firsthand. Many partners and end users are already quite familiar with the new capabilities because we conducted extensive beta testing for these new releases over the last two months. The Beta participation numbers are impressive:

  • 640 users logged into our Beta portal from 45 different countries
  • Over 220 unique pieces of feedback were submitted, including bugs and suggestions for product improvement
  • 176 users filled out a survey sharing their thoughts on the Beta and the new software

So what is everyone excited about? Key highlights in the new releases are:

Fireware 11.11:

  • Network Discovery: a subscription service that generates a visual map of every connected device, providing Firebox administrators total visibility into all assets on their network. Included in all UTM Security Suites on Firebox and XTMv models.
  • Botnet Detection:integrated into the Reputation Enabled Defense service. Customers gain real-time visibility into infected clients and command and control communication is immediately blocked. This feature is available on all XTM and Firebox appliances for any customer with a license for Reputation Enabled Defense (which is included in the UTM security suite).
  • Mobile Security:allows Firebox administrators to enforce access controls and only allow mobile devices that adhere to current corporate policies, and are free of malware. Available as an optional subscription service on all Firebox and XTMv models.

Dimension 2.1:

  • Subscription Services Dashboard: a reporting interface that gives businesses a comprehensive performance summary with statistics to show what has been scanned by a Firebox and attacks or malware that have been prevented.
  • Policy Usage Report: a new report that provides valuable insight into how frequently policies are used, thereby enabling IT teams to keep firewall policies current and eliminate unnecessary or unused policies.
  • User Anonymization: an innovative feature that enables businesses to conform to data privacy regulations, such as the European Union’s General Data Protection Regulation framework.

There are hundreds of more features than what we can cover in a short blog post. Check out the What’s new in Fireware 11.11 and What’s new in Dimension 2.1 presentations to find out full details, including screenshots. Also, watch for more posts on this blog over the next few weeks that go into depth for some of these features.

 

Android Chrome 0day – Daily Security Byte EP. 176

Last week, a Chinese security research disclosed a new zero day Android vulnerability at PacSec’s Pwn2Own competition. Watch today’s video to learn a little more about this flaw, and what to do about it until it’s patched.

(Episode Runtime: 2:13)

Direct YouTube Link: https://www.youtube.com/watch?v=GzE9VpfhkaE

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Mobile DDoS from China – Daily Security Byte EP.151

A hosting and security company discovered attackers leveraging mobile devices in China to launch a DDoS attack against one of its customers. Watch today’s video to learn how this DDoS attack is unique, and what you can do to prevent your computer from becoming a pawn in some criminal’s attack.

(Episode Runtime: 2:50)

Direct YouTube Link: https://www.youtube.com/watch?v=iznz2iN8PRY

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Global Mobile Hack – Daily Security Byte EP.127

The Australian 60 Minutes unveiled a piece on how attackers can track and intercept the calls from any mobile, as long as they know its number. However, others say the researchers demonstrating this attack had special access to carrier networks. Watch today’s video to learn how real this threat is, and whether or not you can do something about it.

(Episode Runtime: 3:34)

Direct YouTube Link: https://www.youtube.com/watch?v=G63kB987kyg

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

PowerOffHijack’s a Dud – Daily Security Byte EP.30

Everyone’s hair is on fire about PowerOffHijack, the Android malware that spies on you when you phone is supposed to be off. Guess what? It’s not nearly as bad as it sounds. Check out the video to learn why.

(Episode Runtime: 2:08)

Direct YouTube Link: https://www.youtube.com/watch?v=LPgNZIs9Iq4

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Snowden Goes to the Oscars – Daily Security Byte EP.29

CitizenFour, a documentary on Edward Snowden, won an Oscar last night. In response, Snowden, Laura Poitras, and Glenn Greenwald participated in an interesting Reddit AMA, which covers interenting security and privacy subject. Watch the video to learn more.

(Episode Runtime: 1:20)

Direct YouTube Link: https://www.youtube.com/watch?v=vy6HIGPaGJE

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

NSA Get Out of Our Phones – WSWiR Episode 140

According to the news cyber criminals, nation states, and even our own employees are attacking our digital networks. In fact there’s so much information security news each day, it’s hard to keep up. If you find yourself falling behind, perhaps my weekly summary video can help.

Today’s episode covers, nation-state malware, booby-trapped popular web sites, dangerous pre-loaded software, and more. Press play below to get the scoop, and feel free to browse the references for other stories.

(Episode Runtime: 10:30)

Direct YouTube Link: https://www.youtube.com/watch?v=HOWUsT2cWgo

EPISODE REFERENCES:

EXTRAS:

— Corey Nachreiner, CISSP (@SecAdept)

NSA SIM Heist – Daily Security Byte EP.28

Wow! The NSA and GCHQ are at it again, this time stealing the keys to our mobile SIM cards. Even if they say they don’t do blanket surveillance, they have the means to. See the video to learn what this is about.

(Episode Runtime: 2:41)

Direct YouTube Link: https://www.youtube.com/watch?v=n14u03lDZtk

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Forbes Forces Malware – Daily Security Byte EP.22

Did you know the Forbes website was serving up targeted malware last December, by exploiting two zero day vulnerabilities? If not, watch the video to learn more.

(Episode Runtime: 2:14)

Direct YouTube Link: https://www.youtube.com/watch?v=nj-S6ss8-dw

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

%d bloggers like this: