The Rotten Tomato Campaign: New SophosLabs research on APTs

rotten-tomato-150A malware campaign seen in August and September 2014 is the subject of new research by one of our threat analysts at SophosLabs.

Just like other recent examples of APTs documented in the media, this malware campaign of was based in China, which tends to get a lot of attention.

Sophos is calling this malware campaign “Rotten Tomato,” in reference to the Tomato Garden campaign; and because some of the samples were rotten in the sense that they were not effectively executed.

Continue reading

Tolly tests show Sophos Encryption is faster with lowest performance impact

tolly-test-report-150Performance tests conducted by the independent testing firm Tolly show that Sophos SafeGuard Encryption is the fastest solution for disk encryption, with the lowest impact on performance for boot-up and in sleep/hibernate/wake tests.

The Tolly test was conducted in June 2014 on laptops running Windows 7 Enterprise. The results, which compared SafeGuard Encryption against products from Check Point, Symantec, and McAfee, show Sophos with a superior performance across all tests.

Continue reading

Everything you need to know about how to set up a firewall

sophos-utmA while back we talked about how you can upgrade your network security with a Sophos UTM for free as a home user.

Here we will explain the basic premise of firewalls and at the same time tell you how you can build one to suit your network.

The firewall is your gatekeeper, your first line of defense, shielding you from the outside world also known as the Internet. The firewall stops unsolicited traffic from the Internet from accessing your network and only allows responses to traffic originating from the inside back through.

Continue reading

What you need to know about the Bash “Shellshock” vulnerability

nsgIn the light of the recent Bash vulnerability known as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), here’s the reality instead of the hype.

Shellshock is a newly-discovered vulnerability in Bash (the Bourne Again Shell), one of the most commonly used shells on Linux, UNIX and OS X.

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue.

Continue reading

Sophos announces immediate support for iOS 8 in mobility management products Sophos Mobile Control and Sophos Cloud Mobile

ios8-150Mobile devices and infrastructure are evolving rapidly, and the adoption of new iOS releases is especially high. That’s why we’re pleased to offer same-day compatibility support for iOS 8 with Sophos Mobile Control (SMC) and Sophos Cloud.

Our enterprise mobility management products cover all the latest mobile platforms, for data protection that doesn’t end at the office door. And we’ve been named a Visionary in the Gartner Magic Quadrant for Enterprise Mobility Management.

Continue reading

What’s the deal with the Home Depot data breach?

TheHomeDepotThe massive data breach of payment card numbers and other customer details at Target last December raised serious doubts about security of point-of-sale (POS) systems. And the recent breach of the Home Depot has amplified those concerns, as more and more retailers are owning up to breaches involving POS compromises.

In the Home Depot’s case, the company hasn’t fully disclosed what data was lost or at how many of its more than 2,000 stores — leading to speculation about the size of the breach and whether the same type of malware that hit Target was involved. [UPDATE: Home Depot confirms 56 million payment card numbers were exposed.]

What can consumers and retailers do to stay safe?

Continue reading