A malware campaign seen in August and September 2014 is the subject of new research by one of our threat analysts at SophosLabs.
Just like other recent examples of APTs documented in the media, this malware campaign was based in China, which tends to get a lot of attention.
Sophos is calling this malware campaign “Rotten Tomato,” in reference to the Tomato Garden campaign; and because some of the samples were rotten in the sense that they were not effectively executed.
There are so many ways a cybercriminal can attack you that it might seem like security is a losing effort. Fortunately, that’s just a misconception. Security can be fairly simple if you know what to do.
That’s why we’re supporting Cyber Streetwise, a UK Government National Cyber Security initiative aimed at changing consumer and small business attitudes to online security.
As Minister for the Digital Economy Ed Vaizey said, “small businesses remain particularly vulnerable to cyber security breaches,” often because they don’t take basic security measures. Here are five easy things you can do to keep your business safe.
Dropbox usernames and passwords were leaked online this week. It’s the latest in a string of recent data breaches involving compromises of third-party websites that take advantage of password re-use to get at users’ accounts on multiple services.
In 2014 alone, millions have had their private information and passwords compromised, leading to what some are calling data breach “fatigue.”
Dropbox was quick to respond, denying a breach on their end while urging their users to enable tighter password security measures.
We’re pleased to announce the availability of Sophos iView, our new reporting appliance add-on for UTM. Sophos iView extends and enhances the Sophos UTM’s already outstanding on-box reporting, adding consolidated reporting across multiple UTMs, compliance reporting, and long-term log storage.
Sophos was among the select companies that Forrester Research, Inc. invited to participate in its report, The Forrester Wave™: Enterprise Mobile Management, Q3 2014. In this evaluation, we were cited as a leader in enterprise mobile management (EMM).
Each of the vendor products evaluated, including our EMM product Sophos Mobile Control, has a large install base, more than $10 million in revenue in 2013, and significant enterprise interest.
Sophos Mobile Control (SMC) received the highest possible rating in the categories of Architecture and scale; Email and directory support; Employee experience; Support; Training; and Partners. Sophos earned the top ranking among all evaluated vendors in Employee experience.
On Thursday, October 23rd there will be casual social meetings in numerous cities around the world to discuss an issue that’s on a lot of people’s minds these days — privacy.
Anyone interested in privacy matters is welcome to come for the discussion, or simply to relax and get to know other people with practical or personal involvements in privacy issues.
These Privacy After Hours events are being organised by members of the International Association of Privacy Professionals (IAPP). There is typically no formal structure, just an evening with some new friends.
Last time we talked about how to set up your firewall. This week we’ll continue looking at some other things that happen in the background but that you can also control and benefit from.
When you set up the UTM for the first time you may have chosen not to enable DHCP, or Dynamic Host Configuration Protocol. You may have chosen not to enable it because you already have a DHCP server on your network or you just don’t know what it is.
In layman’s terms, a DHCP server manages the handing out of IP addresses to devices as they come and go on your network.