Sophos
Displaying 1-40 of 46 results
-
On-demand Webcast: Which Mobile Device is Most Secure?
BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...
Sponsored By Sophos
-
Not Just for PCs Anymore: The Rise of Mobile Malware
Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...
Provided By Sophos
-
Which Mobile Device Is the Most Secure?
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....
Provided By Sophos
-
Your Company Data, Their Personal Device — What Could Go Wrong?
Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.
Provided By Sophos
-
Network protection and UTM Buyers Guide
Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...
Provided By Sophos
-
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...
Provided By Sophos
-
How to Secure Your Wireless Network
It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...
Provided By Sophos
-
Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice
In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.
Provided By Sophos
-
Patch Tuesday, Apple App Privacy and RSA
In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.
Provided By Sophos
-
2012 Buyers Guide to Web Protection
The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not provide web protection everywhere. This paper identifies today's most critical web threats and provides checklists for you to identify and evaluate...
Provided By Sophos
-
Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?
In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.
Provided By Sophos
-
Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks
In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.
Provided By Sophos
-
NCSA and Data Privacy Day
In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...
Provided By Sophos
-
Mobile Security Podcast With Vanja Svajcer
In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.
Provided By Sophos
-
Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained
In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.
Provided By Sophos
-
Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft
In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...
Provided By Sophos
-
IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware
In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...
Provided By Sophos
-
The four rules of complete web protection
As an IT manager you've always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it's time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you...
Provided By Sophos
-
Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security
In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...
Provided By Sophos
-
Endpoint Buyers Guide
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...
Provided By Sophos
-
Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security
In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.
Provided By Sophos
-
VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan
In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...
Provided By Sophos
-
Eight threats your antivirus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.
Provided By Sophos
-
3 Simple Steps to Better Patch Security
Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, we'll explain three best practices for improving your security and compliance with patch assessment.
Provided By Sophos
-
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?
Provided By Sophos
-
Stopping Fake Antivirus: How to Keep Scareware off Your Network
This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Provided By Sophos
-
Using application control to reduce risk with endpoint security
Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's risks of malware infection and data loss. This paper details how endpoint security solutions that incorporate application control provide the most efficient, comprehensive defense against...
Provided By Sophos
-
Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of such mobile devices as laptops, Androids, iPads and USB sticks that contribute to...
Provided By Sophos
-
Seven for 7: Best Practices For Securing Windows 7
In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there's no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it's...
Provided By Sophos
-
The State of Data Security: Defending Against New Risks and Staying Compliant
Since 2005, security breaches have compromised more than 500 million US records. As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you stay compliant with data protection rules and regulations. In this report,you'll learn about what...
Provided By Sophos
-
Attack of the PDF Documents: How Adobe's PDF Format has become one of the top carriers of malware
PDFs have become one of the most common methods for infecting systems with malware. The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader program. This makes it very easy for virus writers to utilize scripting within PDF documents and security holes in...
Provided By Sophos
-
Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. Organizations can use specific technologies and layered...
Provided By Sophos
-
Safer web browsing in four steps: Technology to help you reduce risk
The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and phishing websites are a sample of the exploits that hit users' browsers every day. That leaves your business in a bind:...
Provided By Sophos
-
'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware
Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...
Provided By Sophos
-
Eight threats your anti-virus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes....
Provided By Sophos
-
The 10 myths of safe web browsing
Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...
Provided By Sophos
-
Protecting personally identifiable information: What data is at risk and what you can do about it
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can...
Provided By Sophos
-
Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware
This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...
Provided By Sophos
-
Sophos Case Study: Thorne & Carter
Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...
Provided By Sophos
-
Sophos Free Encryption - Free Tool
Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.
Provided By Sophos
-
On-demand Webcast: Which Mobile Device is Most Secure?
BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...
Sponsored By Sophos
-
Not Just for PCs Anymore: The Rise of Mobile Malware
Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...
Provided By Sophos
-
Which Mobile Device Is the Most Secure?
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....
Provided By Sophos
-
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...
Provided By Sophos
-
Your Company Data, Their Personal Device — What Could Go Wrong?
Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.
Provided By Sophos
-
Network protection and UTM Buyers Guide
Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...
Provided By Sophos
-
How to Secure Your Wireless Network
It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...
Provided By Sophos
-
Safer web browsing in four steps: Technology to help you reduce risk
The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and phishing websites are a sample of the exploits that hit users' browsers every day. That leaves your business in a bind:...
Provided By Sophos
-
Eight threats your antivirus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.
Provided By Sophos
-
3 Simple Steps to Better Patch Security
Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, we'll explain three best practices for improving your security and compliance with patch assessment.
Provided By Sophos
-
Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of such mobile devices as laptops, Androids, iPads and USB sticks that contribute to...
Provided By Sophos
-
Using application control to reduce risk with endpoint security
Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's risks of malware infection and data loss. This paper details how endpoint security solutions that incorporate application control provide the most efficient, comprehensive defense against...
Provided By Sophos
-
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?
Provided By Sophos
-
Stopping Fake Antivirus: How to Keep Scareware off Your Network
This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Provided By Sophos
-
Webinar: Data Loss Prevention: Protecting Your Organization Against Accidental Disclosures
E-mail is a vital communication tool and home to as much as 80% of your organization's records. Its mission-critical use represents a significant risk to your confidential information. Whether it's a small-scale embarrassment or major financial disruption, there's plenty to worry about when it comes to confidential data loss.
...Provided By Sophos
-
Webcast: Top Tips To Keep Data Under Your Control
You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task.
Hosted by Moderator James Hilliard and featuring Compliance and Security...Provided By Sophos
-
Sophos Endpoint Assessment Test
Is your computer a security risk?
- Free scan to assess your security
- Find out if you're missing OS patches
- Discover if your security applications are up to date and active
Provided By Sophos
-
Sophos Threat Detection Test
Is your anti-virus catching everything it should?
- Free virus, spyware, and adware scan
- Test your existing anti-virus protection
- Find threats your anti-virus missed
Provided By Sophos
-
Sophos Security Assessment Tools
Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these complimentary tools from industry leader Sophos will pinpoint any areas of vulnerability that exist on your network. Download and run these four...
Provided By Sophos
-
Sophos Case Study: Thorne & Carter
Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...
Provided By Sophos
-
The Partnerka - What Is It, and Why Should You Care?
Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...
Provided By Sophos
-
Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware
This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...
Provided By Sophos
-
'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware
Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...
Provided By Sophos
-
Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks
In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.
Provided By Sophos
-
Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?
In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.
Provided By Sophos
-
Patch Tuesday, Apple App Privacy and RSA
In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.
Provided By Sophos
-
Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice
In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.
Provided By Sophos
-
NCSA and Data Privacy Day
In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...
Provided By Sophos
-
Mobile Security Podcast With Vanja Svajcer
In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.
Provided By Sophos
-
Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained
In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.
Provided By Sophos
-
Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft
In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...
Provided By Sophos
-
IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware
In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...
Provided By Sophos
-
Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security
In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...
Provided By Sophos
-
Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security
In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.
Provided By Sophos
-
VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan
In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...
Provided By Sophos
-
Eight threats your anti-virus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes....
Provided By Sophos
-
Endpoint Buyers Guide
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...
Provided By Sophos
-
The four rules of complete web protection
As an IT manager you've always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it's time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you...
Provided By Sophos
-
2012 Buyers Guide to Web Protection
The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not provide web protection everywhere. This paper identifies today's most critical web threats and provides checklists for you to identify and evaluate...
Provided By Sophos
-
Sophos Free Encryption - Free Tool
Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.
Provided By Sophos