Sophos

Displaying 1-31 of 31 results

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • White Papers // Jun 2013

    Network protection and UTM Buyers Guide

    Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...

    Provided By Sophos

  • Podcasts // Feb 2012

    Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice

    In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.

    Provided By Sophos

  • Podcasts // Feb 2012

    Patch Tuesday, Apple App Privacy and RSA

    In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.

    Provided By Sophos

  • Podcasts // Feb 2012

    Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?

    In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.

    Provided By Sophos

  • Podcasts // Feb 2012

    Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks

    In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.

    Provided By Sophos

  • Podcasts // Jan 2012

    NCSA and Data Privacy Day

    In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...

    Provided By Sophos

  • Podcasts // Jan 2012

    Mobile Security Podcast With Vanja Svajcer

    In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.

    Provided By Sophos

  • Podcasts // Jan 2012

    Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained

    In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.

    Provided By Sophos

  • Podcasts // Dec 2011

    Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft

    In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...

    Provided By Sophos

  • Podcasts // Dec 2011

    IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware

    In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...

    Provided By Sophos

  • Podcasts // Nov 2011

    Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security

    In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...

    Provided By Sophos

  • White Papers // Nov 2011

    Endpoint Buyers Guide

    It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...

    Provided By Sophos

  • Podcasts // Oct 2011

    Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security

    In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.

    Provided By Sophos

  • Podcasts // Oct 2011

    VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan

    In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • Case Studies // Jan 2010

    Sophos Case Study: Thorne & Carter

    Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...

    Provided By Sophos

  • Downloads // Dec 2009

    Sophos Free Encryption - Free Tool

    Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.

    Provided By Sophos

  • White Papers // Sep 2009

    The Partnerka - What Is It, and Why Should You Care?

    Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...

    Provided By Sophos

  • Webcasts // May 2009

    Webcast: Top Tips To Keep Data Under Your Control

    You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task. Hosted by Moderator James Hilliard and featuring Compliance and Security...

    Provided By Sophos

  • Downloads // May 2009

    Sophos Endpoint Assessment Test

    Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to check your computer security. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Threat Detection Test

    Is your anti-virus catching everything it should? Free virus, spyware, and adware scan Test your existing anti-virus protection Find threats your anti-virus missed Use this free test to check your anti-virus protection. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Security Assessment Tools

    Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these complimentary tools from industry leader Sophos will pinpoint any areas of vulnerability that exist on your network. Download and run these four...

    Provided By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos

  • White Papers // Nov 2011

    Endpoint Buyers Guide

    It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...

    Provided By Sophos

  • Downloads // Dec 2009

    Sophos Free Encryption - Free Tool

    Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • Webcasts // May 2009

    Webcast: Top Tips To Keep Data Under Your Control

    You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task. Hosted by Moderator James Hilliard and featuring Compliance and Security...

    Provided By Sophos

  • Case Studies // Jan 2010

    Sophos Case Study: Thorne & Carter

    Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...

    Provided By Sophos

  • White Papers // Sep 2009

    The Partnerka - What Is It, and Why Should You Care?

    Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • Podcasts // Feb 2012

    Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks

    In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.

    Provided By Sophos

  • Podcasts // Feb 2012

    Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?

    In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.

    Provided By Sophos

  • Podcasts // Feb 2012

    Patch Tuesday, Apple App Privacy and RSA

    In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.

    Provided By Sophos

  • Podcasts // Feb 2012

    Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice

    In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.

    Provided By Sophos

  • Podcasts // Jan 2012

    NCSA and Data Privacy Day

    In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...

    Provided By Sophos

  • Podcasts // Jan 2012

    Mobile Security Podcast With Vanja Svajcer

    In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.

    Provided By Sophos

  • Podcasts // Jan 2012

    Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained

    In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.

    Provided By Sophos

  • Podcasts // Dec 2011

    Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft

    In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...

    Provided By Sophos

  • Podcasts // Dec 2011

    IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware

    In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...

    Provided By Sophos

  • Podcasts // Nov 2011

    Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security

    In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...

    Provided By Sophos

  • Podcasts // Oct 2011

    Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security

    In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.

    Provided By Sophos

  • Podcasts // Oct 2011

    VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan

    In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...

    Provided By Sophos

  • White Papers // Jun 2013

    Network protection and UTM Buyers Guide

    Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...

    Provided By Sophos

  • Downloads // May 2009

    Sophos Endpoint Assessment Test

    Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to check your computer security. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Threat Detection Test

    Is your anti-virus catching everything it should? Free virus, spyware, and adware scan Test your existing anti-virus protection Find threats your anti-virus missed Use this free test to check your anti-virus protection. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Security Assessment Tools

    Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these complimentary tools from industry leader Sophos will pinpoint any areas of vulnerability that exist on your network. Download and run these four...

    Provided By Sophos