{"id":7961,"date":"2015-01-24T14:00:06","date_gmt":"2015-01-24T22:00:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7961"},"modified":"2015-12-11T10:19:20","modified_gmt":"2015-12-11T18:19:20","slug":"palo-alto-networks-news-week-january-24","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/01\/palo-alto-networks-news-week-january-24\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 24"},"content":{"rendered":"<p>Check out the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>How well do you know your Zero Days and APTs? <a href=\"http:\/\/bit.ly\/1CgBCO6\" rel=\"nofollow,noopener\"  target=\"_blank\">Take the challenge<\/a> where knowledge of the worst threats out there could win you great prizes.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7915 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-500x500.jpg\" alt=\"promotion_4[3]\" width=\"500\" height=\"500\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-500x500.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-100x100.jpg 100w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-230x230.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-300x300.jpg 300w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-40x40.jpg 40w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-32x32.jpg 32w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-64x64.jpg 64w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-96x96.jpg 96w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43-128x128.jpg 128w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/promotion_43.jpg 590w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1CH0XyM\" rel=\"nofollow,noopener\"  target=\"_blank\">investigates<\/a> an antivirus app in the Google Play store, which our WildFire analysis cloud captured and identified as \u201cScareware,\u201d that displayed fake virus detection results to scare users into purchasing a premium service and was downloaded over a million times.<!--more--><\/p>\n<p><a href=\"http:\/\/bit.ly\/1CD0Sw0\" rel=\"nofollow,noopener\"  target=\"_blank\">Register for Ignite<\/a> and save $400 when you add the CNSE exam by January 31.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7933 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-500x151.jpg\" alt=\"ignite 2015_\" width=\"500\" height=\"151\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-500x151.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-230x69.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-510x154.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_-132x40.jpg 132w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/ignite-2015_.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>In an effort to continue to drive the performance testing conversation toward the use of application-centric metrics, Palo Alto Networks partnered with Ixia and David Newman of Network Test to develop the first ever public-facing performance test that uses applications commonly found on your network. <a href=\"http:\/\/bit.ly\/1uoKTTm\" rel=\"nofollow,noopener\"  target=\"_blank\">Learn more and see the results here<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/155zwUX\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out this whitepaper<\/a> to read about the shortcomings of proxies and find out how a next-generation security platform can provide faster, simpler and more comprehensive security.<\/p>\n<p>Need to set up a VM-Series NSX edition firewall? <a href=\"http:\/\/bit.ly\/1BVOSYC\" rel=\"nofollow,noopener\"  target=\"_blank\">Use the checklist in the VM-Series Deployment Guide<\/a> for step-by-step instructions.<\/p>\n<p>Researchers from Unit 42 attended ShmooCon 2015 this past weekend and participated in several great presentations. <a href=\"http:\/\/bit.ly\/1GwGTp9\" rel=\"nofollow,noopener\"  target=\"_blank\">Here they recap a few of their favorites<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:28%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon-500x140.png\" alt=\"Shmoocon\" width=\"500\" height=\"140\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon-500x140.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon-230x64.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon-510x143.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon-142x40.png 142w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/Shmoocon.png 1020w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"http:\/\/bit.ly\/1wqvJHu\" rel=\"nofollow,noopener\"  target=\"_blank\">Check out highlights<\/a> of recent Palo Alto Networks coverage in China.<\/p>\n<p>Rick Howard explains why he thinks that the book \"<a href=\"http:\/\/bit.ly\/1ymRNbi\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners<\/a>\"\u00a0by Jason Andress and Steve Winterfeld is Cybersecurity Canon-worthy, and why \"<a href=\"http:\/\/bit.ly\/15ArcwO\" rel=\"nofollow,noopener\"  target=\"_blank\">Inside Cyber Warfare: Mapping the Cyber Underworld<\/a>\" by Jeffrey Carr is a must-read for cybersecurity historians.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1IwXox0\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out how to vote<\/a> on which books you want to see join Parmy Olson\u2019s We Are Anonymous in the Cybersecurity Canon. Don\u2019t see your favorite cybersecurity book on the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/paloaltonetworks-com\/global\/en_US\/index\/threat-research\/cybercanon.html\" target=\"_blank\">candidate list<\/a>? You should\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/whats-favorite-cybersecurity-book-maybe-canon\/\" target=\"_blank\">submit it for consideration<\/a>.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgzOQ==\" target=\"_blank\">Webinar Sant\u00e9<\/a> [French]<\/p>\n<ul>\n<li>When: January 27, 2015 10:30 AM - 11:30 AM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjk0OQ==\" target=\"_blank\">1\u670828\u65e5(\u6c34)Web\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 28, 2015 1:30 PM - 2:30 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkyOQ==\" target=\"_blank\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: January 28, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgxNg==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: January 28, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3Mw==\" target=\"_blank\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: January 28, 2015 10:00 AM - 2:00 PM CST<\/li>\n<li>Where: Houston, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2MA==\" target=\"_blank\">1\u670830\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: January 30, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2MQ==\" target=\"_blank\">\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u043c\u0435\u0440\u043e\u043f\u0440\u0438\u044f\u0442\u0438\u044f Palo Alto Networks<\/a> [Russian]<\/p>\n<ul>\n<li>When: January 30, 2015 9:30 AM - 3:00 PM GMT+3:00<\/li>\n<li>Where: \u041c\u043e\u0441\u043a\u0432\u0430<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMg==\" target=\"_blank\">Lunch with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 3, 2015 12:00 PM - 2:00 PM GMT+13:00<\/li>\n<li>Where: Auckland<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkzMA==\" target=\"_blank\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 11:00 AM - 12:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMA==\" target=\"_blank\">Breakfast with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 7:30 AM - 9:00 AM GMT+11:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3Ng==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc4MQ==\" target=\"_blank\">Virtual Data Centre Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: February 4, 2015 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg5OA==\" target=\"_blank\">Cyber Security Predictions: What to Expect in 2015<\/a><\/p>\n<ul>\n<li>When: February 5, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjkyNg==\" target=\"_blank\">Ultimate Test Drive \u2013 2015<\/a> [French]<\/p>\n<ul>\n<li>When: February 5, 2015 9:00 AM - 1:00 PM CET<\/li>\n<li>Where: Issy-les-Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMw==\" target=\"_blank\">2\u67086\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: February 6, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgyMQ==\" target=\"_blank\">Breakfast with Nir Zuk, Founder &amp; CTO, Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: February 6, 2015 7:30 AM - 9:00 AM GMT+11:00<\/li>\n<li>Where: The Rocks, NSW<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2NQ==\" target=\"_blank\">Die Zwei um Zw\u00f6lf - Modern Malware - Bedrohungsanalyse heute<\/a> [German]<\/p>\n<ul>\n<li>When: February 6, 2015 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out the top Palo Alto Networks news from this past week. &nbsp; How well do you know your Zero Days and APTs? Take the challenge where knowledge of the worst threats &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[654,1026,251,177,1027,1023,309],"coauthors":[716],"class_list":["post-7961","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-china","tag-cnse","tag-cybersecurity-canon","tag-nsx","tag-scareware","tag-shmoocon","tag-vm-series"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7961"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7961\/revisions"}],"predecessor-version":[{"id":11457,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7961\/revisions\/11457"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7961"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}