With the release of Sophos Cloud Server Protection, we’re expanding Sophos Cloud to protect desktops, laptops, mobile phones, tablets – and now servers – with the most effective and simple-to-manage business security offering available.
If compromising desktops is like stealing a wallet, then hacking a server is like robbing a bank. Servers store large amounts of sensitive information and have become popular targets for cybercriminals.
Today’s businesses need the most up-to-date protection, and Sophos Cloud Server Protection gives overtaxed IT personnel an innovative, high performance and simple-to-manage solution for securing server environments.
With a busy week well under way at Amazon’s re:Invent conference, we’re pleased to launch our brand-new AWS Resource Center.
It showcases many of the ways Sophos makes AWS security simple! You’ll find a wealth of valuable information and resources that demonstrate just how easy it is to secure your AWS networks, servers, and applications with Sophos. There are case studies, videos, guides, links to test drives, and much much more to help you get started securing your AWS infrastructure.
Shellshock, a serious vulnerability affecting Linux, UNIX and OS X computers, is making life difficult for IT admins, as vendors rush out patches to stay ahead of the cybercriminals trying to exploit this bug.
Like the Heartbleed bug in OpenSSL, Shellshock has a nasty-sounding name, far-reaching impact, and major consequences for security. Yet Shellshock is worse than Heartbleed in one important way — it could allow an attacker to take complete control of vulnerable machines.
If you’re looking for a little tutorial on Shellshock, we’ve created a simple infographic to explain the bug, how an attacker might exploit it, and what you can do to stay safe.
In the light of the recent Bash vulnerability known as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), here’s the reality instead of the hype.
Shellshock is a newly-discovered vulnerability in Bash (the Bourne Again Shell), one of the most commonly used shells on Linux, UNIX and OS X.
Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue.
The massive data breach of payment card numbers and other customer details at Target last December raised serious doubts about security of point-of-sale (POS) systems. And the recent breach of the Home Depot has amplified those concerns, as more and more retailers are owning up to breaches involving POS compromises.
In the Home Depot’s case, the company hasn’t fully disclosed what data was lost or at how many of its more than 2,000 stores — leading to speculation about the size of the breach and whether the same type of malware that hit Target was involved. [UPDATE: Home Depot confirms 56 million payment card numbers were exposed.]
What can consumers and retailers do to stay safe?
Microsoft’s takedown of the No-IP dynamic DNS service generated a lot of controversy when legitimate customers were impacted by the disruption of 18,000 subdomains abused by cybercriminals.
Microsoft has done its fair share of good, frequently working with law enforcement to take out servers that control malware spewing bots, such as the ZeroAccess botnet. But in this case, Microsoft misfired and caused a lot of collateral damage, according to Sophos security adviser Maxim Weinstein.
In a new post at Dark Reading Maxim writes that the Microsoft vs. No-IP case highlights the need for “clear standards of abuse handling, and transparency on which service providers measure up.”
Whether you call it football or soccer, the FIFA World Cup is the ultimate sporting event. Thirty-two nations and the world’s top players, on the biggest stage, all vying for the chance to be called the world’s best.
To celebrate the World Cup, we picked some of the best players in the world and put them on our dream roster. And because we think many of the same qualities that make a great footballer also make great security products, we matched our top players with their counterparts from our product line-up.
Check out our roster — and let us know what you think. Who would you want on your team?