The CeBIT tech conference got underway Monday in Hanover, Germany, and of course Sophos is there. The big news so far comes from keynote speeches from German Chancellor Angela Merkel and UK Prime Minister David Cameron, who announced a new partnership between the two countries in the hopes of leading the next tech revolution in Europe.
Cameron talked about the future of near-instant media downloads from the 5G Internet, and announced new funding for research projects on the Internet of Things — the huge assortment of connected devices in our increasingly data-driven world.
Today is the day we announce UTM Accelerated (9.2) to the world. If you’ve been following our blog series over the past couple of weeks, you’ll already know about many of the excellent new features we’re introducing. However, you may still be asking yourself why we’re calling this version of our UTM “accelerated” and how you can get hold of this great new software. Read on.
This release is all about shifting up a gear to more quickly recognize a broader range of threats and rapidly alert administrators to allow them to isolate infected systems. It’s about accelerating scanning speeds – in particular for IPS – to ensure the optimal use of resources in every deployment scenario and the best possible performance. And it’s about streamlining administration processes to provide simple yet more effective security.
We often talk about inanimate things as if they live and die — maybe to feel better about them having power over us. Just look at Windows XP, which is now on extended life support until Microsoft finally pulls the plug in April, and which critics would gladly see die.
On Patch Tuesday in April, Microsoft will officially end support for the aging Windows XP with its final security patch. But with millions of people still relying on this long-in-the-tooth operating system, will it live on even after Microsoft has essentially killed it off?
Along these same lines, one of our superb researchers at SophosLabs discovered recently a new variant of the Gameover banking Trojan that borrows code from a rootkit in order to stay hidden, making it much harder to kill. And when it comes to matters of crime and punishment, some cybercriminals are finding that their malicious code will live long after they have gone away.
U.S. beauty supply chain Sally Beauty is apparently the latest victim of a credit card data breach, according to security blogger Brian Krebs, who discovered a new batch of credit card numbers for sale in an underground cybercrime market that had recently been used at Sally Beauty stores.
A spokesperson for Sally Beauty said the company is investigating an intrusion of its network, but found no evidence that credit card numbers had been breached. However, several banks contacted by Krebs said they had made targeted purchases of credit card numbers from the recent online “dump” by cybercriminals to find a common source for the stolen card data — which pointed them back to Sally Beauty stores.
There’s just so much going on in the IT security world right now — from NSA spying to blockbuster data breaches — that it’s hard to say enough about it. Last week at RSA Conference 2014 in San Francisco, Sophos sparked the conversation with our exciting threat research, product development and security awareness efforts.
Our chatty experts Chester Wisniewski and John Shier spoke “live” from RSAC for a Conference Special edition of the weekly Chet Chat podcast. Leading the conversation from his remote location in Sydney, our expert host Paul Ducklin asked about this year’s most buzz-worthy words and phrases at RSA. Listen to our podcast for the word from Duck, Chet and John about the big themes of data security and privacy.
This blog post continues our series introducing the great features you can look forward to in the upcoming UTM Accelerated (9.2) release. I’ll explain how we’re making the web application firewall safer, all in the name of keeping your web services safe from hackers.
A web application firewall (WAF) is a critical defense against the ballooning problem of web-based malware. Hackers are taking over legitimate websites and services at an unprecedented pace to host botnets or distribute malware. Where do you think they find all these websites and services that are ripe for exploitation? I hate to say this, but it’s not always “the other guy’s company” that gets hacked.
Today’s compliance regulations require you to encrypt your data at rest and in motion — whether it’s on a laptop, in an email, stored on a USB drive, or being accessed in the cloud. And yet, 80% of mid-sized companies aren’t even encrypting laptops for fear of slowing down users. All of them should be looking at an encryption solution that protects data everywhere — and won’t hurt performance.
Join Sophos security expert Alan Phillips to learn how you can protect your data with SafeGuard Enterprise — without impacting productivity. Watch the replay below of our quick and informative webcast to see a live demo of the newly released SafeGuard Enterprise 6.1 that delivers encryption without compromise.
A variant of the Gameover banking malware has a newly-discovered rootkit element that works to conceal and protect the malware files on disk and in memory, making it harder to find and remove once the malware is active, according to new research from SophosLabs.
Rootkits are a type of malware designed to gain administrator privileges on infected computers, allowing attackers to modify processes that would otherwise clean up the malware. In Gameover’s case, the addition of code from a crafty rootkit called Necurs means it just became a whole lot harder to fend off. And that means the Gameover gang will have an easier time stealing data from its victims.
This blog post in our series on UTM 9.2 covers a much discussed topic in the network security world: performance. It’s one of those things that customers either don’t care about at all, or it’s at the top of their list of buying criteria. Unfortunately, it’s also an area where there are many misconceptions. So does performance really matter? And if yes, why?
To answer the first question; yes, performance matters. But some throughput numbers matter more than others, and if taken out of context, they matter much less. You need to look at your individual environment to fully understand your requirements.
The Royal Mail in the UK issued a warning that a wave of spam containing fake delivery notices is spreading an unwelcome package — Cryptolocker, the notorious file-encrypting ransomware that locks up a victim’s files until a ransom is paid to the criminals.
Meanwhile, a UK research study found that a staggering 41% of Cryptolocker victims said they agreed to pay the ransom to get their files back, a percentage that the researchers said was “much larger than expected.”