SophosLabs today raised the Threat Level to “High Risk,” due to a vulnerability in the Microsoft Graphics component that could allow remote code execution. The flaw affects Microsoft Windows, Microsoft Office, and Microsoft Lync.
Our High Risk designation means there is a strong possibility of this vulnerability being actively exploited by malware.
According to SophosLabs, Microsoft has yet to release a patch to fix this vulnerability. In the meantime, we recommend running the FixIt tool provided by Microsoft to block the vulnerability until a patch is released.
Recently we told you about how Sophos protects you from the nasty Cryptolocker ransomware. Now we’d like to give you a little demonstration of how it spreads, how it encrypts files, and how it extracts a ransom from its victims.
Our Support teams have put together a video demonstration (embedded below) that shows what Cryptolocker actually looks like and how it works.
Learn how Sophos is protecting you against the popular and nasty ‘Cryptolocker’ ransomware that is holding hundreds of computers hostage around the globe.
With the release of Sophos Mobile Control 3.5, we’ve added some new features and functionality, and updated the web front-end. Whether you’re an admin with experience using previous versions of SMC, or it’s entirely new to you, our latest helpful training video gives you a detailed look at the web console and how to use it.
Here at Sophos Global Support Services, we want to make it easy for you to understand our products and how to use them effectively. In the Support section of our website, you can find other resources about SMC.
Watch the video below:
Great news, Sophos friends. Starting today, we’ve launched a new Threat Awareness forum as part of our SophosTalk online community.
Threat Awareness is different from our other support and product forums. It’s a place where you can talk about threats and attacks you’ve experienced, and ask for help. Members can make comments, ask questions and offer advice.
We’re interested in hearing about malware, spam, potentially unwanted applications—anything that’s out there and seeking to compromise security. What was the threat, and what did it try to do? How was it cleaned up?