{"id":5598,"date":"2014-05-16T13:30:38","date_gmt":"2014-05-16T20:30:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5598"},"modified":"2021-03-22T07:30:08","modified_gmt":"2021-03-22T14:30:08","slug":"palo-alto-networks-news-week-may-16","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/palo-alto-networks-news-week-may-16\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 May 16"},"content":{"rendered":"<p>Interested in the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\">Palo Alto Networks news<\/a>\u00a0from this past week? It\u2019s all right here.<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks researchers <a href=\"http:\/\/bit.ly\/1jTenkn\" target=\"_blank\" rel=\"noopener\">identified<\/a> a new Trojan, Funtasy, that targets Spanish Android users with sneaky SMS charges.<!--more--><\/p>\n<p><a href=\"http:\/\/bit.ly\/1leyfLD\" target=\"_blank\" rel=\"noopener\">For the Record<\/a>: We recently asked several Palo Alto Networks customers to describe the benefits of WildFire, and why adding a WildFire subscription to their Palo Alto Networks deployment is a better option than buying a standalone detection product or service.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"489\"><span class=\"ar-custom\" style=\"padding-bottom:55.42%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5599 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/custoemrs-wildfire.png\" alt=\"custoemrs wildfire\" width=\"489\" height=\"271\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/custoemrs-wildfire.png 489w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/custoemrs-wildfire-230x127.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/custoemrs-wildfire-72x40.png 72w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/span><\/div><\/p>\n<p>Sharat Sinha, Palo Alto Networks VP, <a href=\"http:\/\/bit.ly\/1g1GaiZ\" target=\"_blank\" rel=\"noopener\">detailed<\/a> 3 security priorities for the Asia Pacific region.<\/p>\n<p>Kevin Magee, Palo Alto Networks Regional Sales Manager for Ontario, Public Sector, <a href=\"http:\/\/bit.ly\/1oLF0rL\" target=\"_blank\" rel=\"noopener\">shared<\/a> his perspective on the success of the Palo Alto Networks Expert Forums held recently in Ontario\u2019s unique public sector community.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5566 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59-500x375.jpg\" alt=\"2014-04-29 11.15.59\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/2014-04-29-11.15.59.jpg 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>We hosted our third annual EMEA Expert Tour <a href=\"http:\/\/bit.ly\/1nKZoMm\" target=\"_blank\" rel=\"noopener\">under the sun<\/a> this week in Marbella, Spain with NextWave partner sales engineers and technicians across the EMEA region.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:39.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5587 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/8J0A9663-500x196.jpg\" alt=\"8J0A9663\" width=\"500\" height=\"196\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/8J0A9663-500x196.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/8J0A9663-230x90.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/8J0A9663-510x200.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/8J0A9663-101x40.jpg 101w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>We <a href=\"http:\/\/bit.ly\/1jQgZjx\" target=\"_blank\" rel=\"noopener\">talked<\/a> at our Federal Expert Forum about tackling the government\u2019s toughest cybersecurity challenges.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:54.24%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5600 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/gov.png\" alt=\"gov\" width=\"483\" height=\"262\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/gov.png 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/gov-230x124.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/gov-73x40.png 73w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>As a continuing part of our government and public sector activities, <a href=\"http:\/\/bit.ly\/1p7oFBJ\" target=\"_blank\" rel=\"noopener\">we are featured<\/a> on Federal News Radio\/WTOP in the United States over the next few months. Check it out to hear Rick and Steve Hoffman, VP, U.S. Federal, talk about what advanced government security teams are doing today.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"343\"><span class=\"ar-custom\" style=\"padding-bottom:54.52%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5422 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png\" alt=\"Untitled\" width=\"343\" height=\"187\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11.png 343w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-230x125.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Untitled11-73x40.png 73w\" sizes=\"auto, (max-width: 343px) 100vw, 343px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Danelle Au <a href=\"http:\/\/bit.ly\/STS98i\" target=\"_blank\" rel=\"noopener\">discussed<\/a> the massive challenge of securing the Internet of Things.<\/p>\n<p>Our own James Sherlow <a href=\"http:\/\/bit.ly\/1gvCrFa\" target=\"_blank\" rel=\"noopener\">commented<\/a> on whether it is time to kill OpenSSL post-Heartbleed.<\/p>\n<p>Join fellow IT Managers &amp; Security Experts at the <a href=\"http:\/\/bit.ly\/1gyHBzW\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Customer Forum<\/a> on May 21 in The Netherlands. If you attend, you could win a great prize.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5347 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg\" alt=\"PANW Customer Forum\" width=\"500\" height=\"166\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-500x166.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-230x76.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-510x170.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum-120x40.jpg 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PANW-Customer-Forum.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Here are more <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> you should know about:<\/p>\n<ul>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEwNQ==\" target=\"_blank\" rel=\"noopener\">Application or Threat: 3 keys to sniffing them out<\/a>\n<ul>\n<li>When: May 20, 2014 from 8:00 AM - 9:30 AM GMT+12:00<\/li>\n<li>Where: Westhaven Marina, Auckland<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkwNQ==\" target=\"_blank\" rel=\"noopener\">Forum De La S\u00e9curit\u00e9 IT<\/a> [French]\n<ul>\n<li>When: May 20, 2014 from 9:00 AM - 6:00 PM CET<\/li>\n<li>Where: Tlemcen<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE1MQ==\" target=\"_blank\" rel=\"noopener\">Strategies that Work for Advanced Persistent Threat Prevention<\/a>\n<ul>\n<li>When: May 20, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMw==\" target=\"_blank\" rel=\"noopener\">Building a Zero Trust Approach to Network Security<\/a>\n<ul>\n<li>When: May 21, 2014 from 11:00 AM - 12:00 PM EST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE1OQ==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a>\n<ul>\n<li>When: May 21, 2014 from 10:30 AM - 11:30 AM GMT+5:30<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjExNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: May 21, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA4Ng==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive \u2013 Markham<\/a>\n<ul>\n<li>When: May 22, 2014 from 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: Markham, ON<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA2MA==\" target=\"_blank\" rel=\"noopener\">Unders\u00f6ker ni alternativ till Cisco ASA 5500 ?<\/a> [Swedish]\n<ul>\n<li>When: May 22, 2014 from 3:00 PM - 4:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMA==\" target=\"_blank\" rel=\"noopener\">Die Zwei um Zw\u00f6lf: Advanced Persistent Threats und Modern Malware<\/a> [German]\n<ul>\n<li>When: May 23, 2014 from 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTk4NA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a> [Polish]\n<ul>\n<li>When: May 23, 2014 from 10:00 AM - 11:00 AM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Ng==\" target=\"_blank\" rel=\"noopener\">Oppdag hurtig ukjente trusler med utvidet visibilitet og intelligens<\/a>. [Norwegian]\n<ul>\n<li>When: May 27, 2014 from 3:00 PM - 3:30 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4MQ==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Spanish]\n<ul>\n<li>When: May 28, 2014 from 8:00 PM - 10:00 PM CST<\/li>\n<li>Where: Ciudad de Mexico, DF<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNA==\" target=\"_blank\" rel=\"noopener\">Next Generation Security Technical Workshop<\/a>\n<ul>\n<li>When: May 28, 2014 from 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjExNQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a>\n<ul>\n<li>When: May 28, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2OQ==\" target=\"_blank\" rel=\"noopener\">Transforming Networks Security with the Software Defined Data Center<\/a>\n<ul>\n<li>When: May 28, 2014 from 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjA5Ng==\" target=\"_blank\" rel=\"noopener\">Ultimate Test Drive Workshop Brisbane<\/a>\n<ul>\n<li>When: May 28, 2014 from 11:00 AM - 3:00 PM GMT+10:00<\/li>\n<li>Where: Brisbane<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTcyMw==\" target=\"_blank\" rel=\"noopener\">AFCEA: Spring Intelligence Symposium \u2013 Intel<\/a>\n<ul>\n<li>When: May 29, 2014 from 8:00 AM - 6:00 PM EST<\/li>\n<li>Where: Bethesda, MD<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjEzMQ==\" target=\"_blank\" rel=\"noopener\">Combat APTs with Palo Alto Networks<\/a>\n<ul>\n<li>When: May 29, 2014 from 10:30 AM - 11:30 AM GMT+7:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a>\n<ul>\n<li>When: May 29, 2014 from 11:30 AM - 1:30 PM MST<\/li>\n<li>Where: Edmonton, AB<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE4Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Spanish]\n<ul>\n<li>When: May 29, 2014 6:30 PM - 9:00 PM CST<\/li>\n<li>Where: Monterrey<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjE2Nw==\" target=\"_blank\" rel=\"noopener\">Oppdag hurtig ukjente trusler med utvidet visibilitet og intelligens<\/a>. [Norwegian]\n<ul>\n<li>When: May 30, 2014 from 3:00 PM - 3:30 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Interested in the top Palo Alto Networks news\u00a0from this past week? It\u2019s all right here. &nbsp; Palo Alto Networks researchers identified a new Trojan, Funtasy, that targets Spanish Android users with sneaky &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133,203,78,410],"tags":[172,393,188,452,123,400,464,355,401,284,424,69],"coauthors":[709],"class_list":["post-5598","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","category-news-of-the-week","category-partners","category-vertical","tag-android","tag-customer","tag-expert-forum","tag-funtasy","tag-government2","tag-heartbleed","tag-internet-of-things","tag-nextwave","tag-openssl","tag-public-sector","tag-trojan","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5598"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5598\/revisions"}],"predecessor-version":[{"id":128755,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5598\/revisions\/128755"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5598"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}