{"id":5418,"date":"2014-04-25T14:00:11","date_gmt":"2014-04-25T21:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5418"},"modified":"2014-07-16T08:23:57","modified_gmt":"2014-07-16T15:23:57","slug":"palo-alto-networks-news-week-april-24","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/04\/palo-alto-networks-news-week-april-24\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 April 24"},"content":{"rendered":"<p>Here\u2019s a look at all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news <\/a>from this past week.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/04\/cardbuyer-new-smart-android-trojan\/\" target=\"_blank\">Palo Alto Networks researchers detected<\/a> a new Android Trojan, named Cardbuyer, that can defeat multi-factor verification and steal money by purchasing prepaid game cards. Read a full analysis <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/04\/cardbuyer-new-smart-android-trojan\/\">here<\/a>.<\/p>\n<p>If you attended Ignite 2014, <a href=\"http:\/\/bit.ly\/1lw1qzZ\" rel=\"nofollow,noopener\"  target=\"_blank\">you\u2019re eligible to join the official Ignite Alumni Network<\/a> where you can access videos, presentation slides and other resources from past Ignite conferences.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"215\"><span class=\"ar-custom\" style=\"padding-bottom:65.12%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5143 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Ignite_logo.png\" alt=\"Ignite_logo\" width=\"215\" height=\"140\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Ignite_logo.png 215w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Ignite_logo-61x40.png 61w\" sizes=\"auto, (max-width: 215px) 100vw, 215px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>In <a href=\"http:\/\/bit.ly\/1prxd6M\" rel=\"nofollow,noopener\" >this post<\/a>, Brian Tokuyoshi discusses how to use GlobalProtect &amp; Palo Alto Networks next-generation security to deal with mobile malware.<\/p>\n<p>Parmy Olson, Forbes reporter and author of We Are Anonymous, <a href=\"http:\/\/bit.ly\/1jrH83r\" rel=\"nofollow,noopener\"  target=\"_blank\">spoke to Palo Alto Networks<\/a> about what we\u2019ve learned as a cybersecurity community since Anonymous and what she sees as major trends in hacktivism, wearable tech and mobile security in general.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"336\"><span class=\"ar-custom\" style=\"padding-bottom:55.06%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5420 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled9.png\" alt=\"Untitled\" width=\"336\" height=\"185\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled9.png 336w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled9-230x126.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled9-72x40.png 72w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>This month\u2019s <a href=\"http:\/\/bit.ly\/1jG55W7\" rel=\"nofollow,noopener\"  target=\"_blank\">Customer Spotlight<\/a>: Solving BYOD at Japan\u2019s Kyushu University<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"134\"><span class=\"ar-custom\" style=\"padding-bottom:119.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5381 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/imgres.jpg\" alt=\"imgres\" width=\"134\" height=\"160\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/imgres.jpg 134w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/imgres-33x40.jpg 33w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/span><\/div><\/center><!--more--><\/p>\n<p>Heading to Infosecurity Europe next week? Check out <a href=\"http:\/\/bit.ly\/1fqPKGy\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks at Booth J30<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"393\"><span class=\"ar-custom\" style=\"padding-bottom:30.03%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5421 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled10.png\" alt=\"Untitled\" width=\"393\" height=\"118\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled10.png 393w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled10-230x69.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled10-133x40.png 133w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Next week we have two webinars featuring speakers from SANS Institute. Don\u2019t forget to register!<\/p>\n<ul>\n<li>Tuesday, April 29 at 1 p.m. EDT, Del Rodillas will be hosting \u201c<a href=\"http:\/\/bit.ly\/1mAi6Wr\" rel=\"nofollow,noopener\"  target=\"_blank\">Defending ICS Against Cyberthreats with Next Generation Security<\/a>,\u201d alongside Mike Assante, the Head of SCADA\/ICS Security at the SANS Institute and a recognized control systems security expert.<\/li>\n<\/ul>\n<ul>\n<li>Wednesday, April 30 at 3 p.m. EDT, Tony Sager, SANS Institute, and Scott Simkin will be hosting \u201c<a href=\"http:\/\/bit.ly\/1jP6QAr\" rel=\"nofollow,noopener\"  target=\"_blank\">Need to Defeat APTs? Tony Sager Explains Where We\u2019re At With Live Threat Detection Automation<\/a>.\u201d<\/li>\n<\/ul>\n<p>The annual <a href=\"http:\/\/bit.ly\/1lCfhEH\" rel=\"nofollow,noopener\"  target=\"_blank\">FS-ISAC Summit<\/a>, May 4-7 in Florida, is around the corner, and several members of our executive team will be there to give you a deep dive on our innovative, integrated, and automated enterprise security platform.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5374 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services-500x139.png\" alt=\"financial services\" width=\"500\" height=\"139\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services-500x139.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services-230x64.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services-510x142.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services-143x40.png 143w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/financial-services.png 1180w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>For those who work in government and who would like to attend our upcoming Federal Expert Forum in Washington on May 15, <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk5Mg==\/\" target=\"_blank\">please register here<\/a>. This free event will cover the unique technology demands of U.S. federal agencies.<\/p>\n<p>As a continuing part of our government and public sector activities, <a href=\"http:\/\/bit.ly\/1p7oFBJ\" rel=\"nofollow,noopener\"  target=\"_blank\">we are featured<\/a> on Federal News Radio\/WTOP in the United States over the next few months.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"343\"><span class=\"ar-custom\" style=\"padding-bottom:54.52%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5422 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png\" alt=\"Untitled\" width=\"343\" height=\"187\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png 343w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-73x40.png 73w\" sizes=\"auto, (max-width: 343px) 100vw, 343px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Join fellow IT Managers &amp; Security Experts at the <a href=\"http:\/\/bit.ly\/1gyHBzW\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks Customer Forum<\/a> on May 21 in The Netherlands.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5347 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg\" alt=\"PANW Customer Forum\" width=\"500\" height=\"166\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-230x76.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-510x170.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-120x40.jpg 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are more <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> you should know about:<\/p>\n<ul>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk1MA==\" target=\"_blank\">EXPERT FORUM - Cambridge, Ontario<\/a>\n<ul>\n<li>When: April 29, 2014 from 8:30 AM - 12:30 PM EDT<\/li>\n<li>Where: Cambridge, ON<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjAzOQ==\" target=\"_blank\">Palo Alto Networks Ultimate Test Drive<\/a> [Spanish]\n<ul>\n<li>When: April 29, 2014 from 8:00 AM - 12:00 PM EST<\/li>\n<li>Where: Bella Vista<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA0MA==\" target=\"_blank\">Palo Alto Networks: ANZ Live Demo<\/a>\n<ul>\n<li>When: April 29, 2014 from 10:00 AM - 11:00 AM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2Mw==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: April 30, 2014 from 9:00 AM - 10:00 AM PDT<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEwNw==\" target=\"_blank\">Need to defeat APTs? SANS Discusses Live Threat Detection Automation<\/a>\n<ul>\n<li>When: April 30, 2014 from 3:00 PM - 4:00 PM EDT<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEwMw==\" target=\"_blank\">Palo Alto Networks Ultimate Test Drive [Spanish]<\/a>\n<ul>\n<li>When: April 30, 2014 from 10:00 AM-5:00 PM<\/li>\n<li>Where: Sao Leopoldo-RS<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2Mw==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: April 30, 2014 from 9:00 AM - 10:00 AM PDT<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTc3Ng==\" target=\"_blank\">NASCIO 2013 Midyear Conference<\/a>\n<ul>\n<li>When: May 6, 2014 from 8:00 AM - 6:00 PM ADT<\/li>\n<li>Where: Baltimore, MD<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2MQ==\" target=\"_blank\">The Ultimate Test Drive - Data Center NYC<\/a>\n<ul>\n<li>When: May 6, 2014 from 8:30 AM - 1:00 PM EDT<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA1NQ==\" target=\"_blank\">Palo Alto Networks' Next-Generation Security Ultimate Test Drive<\/a>\n<ul>\n<li>When: May 7, 2014 from 11:30 AM - 6:00 PM EDT<\/li>\n<li>Where: Jessup, MD<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2NA==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: May 7, 2014 from 9:00 AM - 10:00 AM PDT<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a look at all of the top Palo Alto Networks news from this past week. Palo Alto Networks researchers detected a new Android Trojan, named Cardbuyer, that can defeat multi-factor verification &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203,566],"tags":[120,403,217],"coauthors":[],"class_list":["post-5418","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","category-scada-ics","tag-cybersecurity","tag-events-2","tag-ignite-2014"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5418"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5418\/revisions"}],"predecessor-version":[{"id":5433,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5418\/revisions\/5433"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5418"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}