{"id":6168,"date":"2014-07-18T15:00:01","date_gmt":"2014-07-18T22:00:01","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6168"},"modified":"2021-03-22T08:25:09","modified_gmt":"2021-03-22T15:25:09","slug":"palo-alto-networks-news-week-july-18","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/07\/palo-alto-networks-news-week-july-18\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 July 18"},"content":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Tim Treat <a href=\"http:\/\/bit.ly\/1jyHpZb\" target=\"_blank\" rel=\"noopener\">explained<\/a> how a next-generation enterprise security platform can directly influence M&amp;A activity.<\/p>\n<p>Our researchers detailed why Havex, also known as DragonFly, Energetic Bear and by other variants, is a game-changing threat to Industrial Control Systems. See <a href=\"http:\/\/bit.ly\/UcBL2K\" target=\"_blank\" rel=\"noopener\">part 1<\/a> and <a href=\"http:\/\/bit.ly\/1r4TUMH\" target=\"_blank\" rel=\"noopener\">part 2<\/a> of our analysis.<!--more--><\/p>\n<p>For all their differences, vertical industries have similar cybersecurity challenges and they deserve 20\/20 vision. <a href=\"http:\/\/bit.ly\/1sHNpPa\" target=\"_blank\" rel=\"noopener\">Find out how<\/a> investing in Palo Alto Networks platforms is like getting a new pair of reading glasses.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks Wildfire <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/07\/sms-based-app-purchase-android-worth-risk\/\" target=\"_blank\" rel=\"noopener\">recently discovered eight different SMS-based in-app purchase SDKs<\/a> with abusive functionality. To our researchers, that means SMS-based in-app purchasing on Android is not worth the risk.<\/p>\n<p>Use-after-free bugs have affected Internet Explorer for years, but Microsoft's recent moves suggest it is addressing the fundamentals of use-after-free exploitation in a preventative manner. <a href=\"http:\/\/bit.ly\/1ncJKt8\" target=\"_blank\" rel=\"noopener\">See what Palo Alto Networks researchers have to say about it<\/a>.<\/p>\n<p>Rick Howard added a new candidate to the Cybersecurity Canon, \u201cNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State\u201d by Glenn Greenwald. Read his thoughts on this book in <a href=\"http:\/\/bit.ly\/1mOOmEb\" target=\"_blank\" rel=\"noopener\">part 1<\/a> and <a href=\"http:\/\/bit.ly\/1wra0j4\" target=\"_blank\" rel=\"noopener\">part 2<\/a>.<\/p>\n<p>Palo Alto Networks researchers recently discovered a backdoor implant used to control a Linux operating system. Find out more about this discovery and what it means for your system <a href=\"http:\/\/bit.ly\/1naYWan\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Black Hat 2014 is right around the corner, and it\u2019ll be easy to <a href=\"http:\/\/bit.ly\/1zJRGX2\" target=\"_blank\" rel=\"noopener\">find Palo Alto Networks<\/a> at the conference!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:53.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6140 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-500x269.png\" alt=\"logo\" width=\"500\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-500x269.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-230x123.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-510x274.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo-74x40.png 74w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logo.png 522w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Can you tell the difference between a business application and a threat? <a href=\"http:\/\/bit.ly\/1qACSUB\" target=\"_blank\" rel=\"noopener\">Attend our webinar<\/a> on July 23 at 11 a.m. PT to explore this intertwined relationship between cyber-attacks and the applications in use on enterprise networks.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5995 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-500x61.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"61\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-500x61.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg-240x29.jpg 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Our CSO Rick Howard was on a panel at the <a href=\"http:\/\/www.security-innovation.org\/innovation-summit_2014.htm\" target=\"_blank\" rel=\"noopener\">SINET\u00a0Innovation Summit 2014<\/a> this week.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6169 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3-500x375.jpg\" alt=\"photo 3\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/photo-3.jpg 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Coverage around the world:<\/p>\n<ul>\n<li>B!T magazine, <a href=\"http:\/\/bit.ly\/1koYBuX\" target=\"_blank\" rel=\"noopener\">Como o malware se esconde nas aplica\u00e7\u00f5es de uso comum<\/a> [Portuguese]<\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"151\"><span class=\"ar-custom\" style=\"padding-bottom:48.34%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6170 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/bit.png\" alt=\"bit\" width=\"151\" height=\"73\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/bit.png 151w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/bit-82x40.png 82w\" sizes=\"auto, (max-width: 151px) 100vw, 151px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<ul>\n<li>Computerworld Hong Kong, <a href=\"http:\/\/bit.ly\/1oVIlWk\" target=\"_blank\" rel=\"noopener\">IoT: Challenges of securing IP-enabled devices<\/a><\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"242\"><span class=\"ar-custom\" style=\"padding-bottom:21.07%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6172 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/computerworld-hk.png\" alt=\"computerworld hk\" width=\"242\" height=\"51\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/computerworld-hk.png 242w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/computerworld-hk-230x48.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/computerworld-hk-189x40.png 189w\" sizes=\"auto, (max-width: 242px) 100vw, 242px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<ul>\n<li>TI Inside, <a href=\"http:\/\/bit.ly\/1nopRd0\" target=\"_blank\" rel=\"noopener\">Essilor Brasil padroniza seguran\u00e7a de rede na Am\u00e9rica Latina<\/a> [Portuguese]<\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"191\"><span class=\"ar-custom\" style=\"padding-bottom:49.74%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6173 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logoseguranca.png\" alt=\"logoseguranca\" width=\"191\" height=\"95\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logoseguranca.png 191w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/logoseguranca-80x40.png 80w\" sizes=\"auto, (max-width: 191px) 100vw, 191px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<ul>\n<li>ChannelWorld.in, <a href=\"http:\/\/dlvr.it\/6K91mz\" target=\"_blank\" rel=\"noopener\">IoT: Challenges of Securing IP-enabled Devices<\/a><\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"363\"><span class=\"ar-custom\" style=\"padding-bottom:27.82%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6171 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/channelworld-in.png\" alt=\"channelworld in\" width=\"363\" height=\"101\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/channelworld-in.png 363w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/channelworld-in-230x63.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/channelworld-in-143x40.png 143w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<ul>\n<li>SWA, <a href=\"http:\/\/bit.ly\/1qfKGPO\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Ekspansi Bisnis ke Indonesia<\/a> [Indonesian]<\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"175\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6174 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/SWA-230x230.png\" alt=\"SWA\" width=\"175\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/SWA-230x230.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/SWA-100x100.png 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/SWA-40x40.png 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/07\/SWA.png 250w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5MA==\" target=\"_blank\" rel=\"noopener\">How to Migrate from Cisco to Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: July 22, 2014 from 3:00 PM - 4:00 PM GMT+10:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxNg==\" target=\"_blank\" rel=\"noopener\">Hiding in Plain Sight - What\u2019s Really Happening on Your Network<\/a><\/p>\n<ul>\n<li>When: July 23, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgxNg==\" target=\"_blank\" rel=\"noopener\">Next Generation Security Technical Workshop<\/a><\/p>\n<ul>\n<li>When: July 23, 2014 from 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI4MQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: July 23, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5Nw==\" target=\"_blank\" rel=\"noopener\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: July 23, 2014 from 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Newport News, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyNQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: July 30, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top Palo Alto Networks news. &nbsp; Tim Treat explained how a next-generation enterprise security platform can directly influence M&amp;A activity. Our researchers detailed why Havex, also &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203,566,410],"tags":[172,166,286,251,564,240,575,386,46,580,571,498,97,69],"coauthors":[709],"class_list":["post-6168","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","category-scada-ics","category-vertical","tag-android","tag-black-hat","tag-coverage","tag-cybersecurity-canon","tag-havex","tag-internet-explorer","tag-linux","tag-ma","tag-microsoft","tag-sinet","tag-sms","tag-use-after-free","tag-webinar","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6168"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6168\/revisions"}],"predecessor-version":[{"id":128776,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6168\/revisions\/128776"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6168"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}