Snowshoe Spam is on the Rise – What can be done about it?

snowshoes02In our 2014 Threat Report, we noted that snowshoe spam was gaining popularity amongst spammers using new techniques to evade detection and sneak through loopholes in anti-spam laws. Over the last several months, we’ve noticed the volume of snowshoe spam continuing to build at a tremendous pace.

Snowshoe spam is essentially unsolicited bulk email. And it’s been effective, because like a snowshoe, it spreads the load across a large area. In this case, distributing spam across a huge range of IP addresses many of which are used briefly, and only once, sending out massive volumes of spam in very short bursts. The temporary aspect of these campaigns has also given rise to the term ‘hit-and-run’ spam. Naturally, this technique makes it challenging for filters to determine spam based on reputation.

Continue reading

New Amazon Web Services Resource Center

aws-1With a busy week well under way at Amazon’s re:Invent conference, we’re pleased to launch our brand-new AWS Resource Center.

It showcases many of the ways Sophos makes AWS security simple!  You’ll find a wealth of valuable information and resources that demonstrate just how easy it is to secure your AWS networks, servers, and applications with Sophos.  There are case studies, videos, guides, links to test drives, and much much more to help you get started securing your AWS infrastructure.

Continue reading

Sophos Warbiking exposes Wi-Fi hotspot dangers in San Diego

warbiking-san-diegoWe took our Warbiking tour to San Diego to raise awareness about wireless security, and we discovered that people in this high-tech city are connecting to thousands of unprotected wireless networks.

San Diego is a very technology-focused place, with lots of people connecting their mobiles and laptops to Wi-Fi hotspots around the city. And much like other cities we’ve visited such as New York and London, people may be unaware of the worrisome lack of security on many of these hotspots.

Chester Wisniewski, Sophos Senior Security Advisor, toured the city on his specially-equipped bike, picking up the signals of 8,048 Wi-Fi networks, to find out what kind of security they were using.

Continue reading

Sophos UTM Advantage (9.3) is coming soon – find out what’s new!

UTM Advantage IconWe’re pleased to commence the roll-out of our latest major UTM software update: UTM Advantage (9.3).

More and more organizations are switching to Sophos UTM for their next firewall to take advantage of our all-in-one protection with on-box reporting, simplicity and performance. This release continues to add even more value and protection while making things easier for everyone.

If you’re not already a Sophos UTM customer, UTM Advantage (9.3) adds to the 5 great reasons why you should switch to a better Firewall. Watch our brief demo video of what’s new in UTM Advantage (9.3). The complete release notes are provided below.

Continue reading

How much does cybercrime cost retailers? Here’s what you can do to stay secure

hackers-retail-dataRetailers and small businesses have been hit hard by cybercriminals over the past two years. According to a recent report from the Center for Strategic and International Studies, cybercrime losses at UK retailers alone totaled £505 million (about $800 million) in 2013.

Those costs could include lost productivity from impaired web performance, fines following data breaches, lost revenue from the theft of intellectual property, the costs of cleaning up malware infections, and more.

Sophos UTM provides the ultimate protection against cyberattacks on your business, protecting you not just at the network layer, but also shielding your servers and applications from attack; protecting your data from theft; keeping your mobile users safe; and helping you to secure branch offices and stores, even where there are no staff with IT experience.

Continue reading

The Rotten Tomato Campaign: New SophosLabs research on APTs

rotten-tomato-150An advanced persistent threat (APT) malware campaign seen in August and September 2014 is the subject of new research by one of our threat analysts at SophosLabs.

Sophos is calling this malware campaign “Rotten Tomato,” in reference to the Tomato Garden campaign; and because some of the samples were rotten in the sense that they were not effectively executed.

In a new technical paper on the threat, Principal Threat Researcher Gabor Szappanos, of SophosLabs Hungary, writes an interesting dive into the world of the attackers, examining the malware used by cybercriminals in these attacks, and shows how several different groups used the same zero-day Microsoft Word exploit.

Continue reading