PRODUCTS

Cyber Security Elements by NSS

January 2013

New Peplink Balance 2500 router and Updated Technology Pages

Learn How Balance and MAX Routers Team Up for Unbreakable VPNs The Balance lineup uses Peplink SpeedFusion technology to integrate seamlessly with MAX cellular routers and deliver unstoppable VPNs in a wide variety of applications. To see how, visit our updated Balance and Unbreakable VPN pages. Filled with helpful deployment diagrams and technology highlights, they’re […]

New Peplink Balance 2500 router and Updated Technology Pages Read More »

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security

Πως μοιάζει το νέο Κέντρο Διαχείρισης; Ποια λειτουργικά συστήματα υποστηρίζονται και ποιοι clients είναι διαθέσιμοι; Ποια είναι η διαφορά μεταξύ των UEFI και BIOS και γιατί χρειάζεται να το ξέρετε αυτό όταν πουλάτε ή εγκαθιστάτε το SGN; Μπορούμε να υποθέσουμε ότι η Native (Γηγενή) Κρυπτογράφηση είναι ίδια με το SafeGuard Enterprise Device Encryption; Μπορούν οι

Η Sophos και η NSS στο 4ο συνέδριο Infocom Security Read More »

What you need to know about the Bash “Shellshock” vulnerability

Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself. In addition, we have examined our products and we are

What you need to know about the Bash “Shellshock” vulnerability Read More »

$80 million yacht hijacked by students spoofing GPS signals

But those signals were not authentic, and the ship was not on course. The signals were in fact being sent from the White Rose’s upper deck by University of Texas/Cockrell School of Engineering graduate students Jahshan Bhatti and Ken Pesyna. A team from the school had been invited aboard while the White Rose sailed from

$80 million yacht hijacked by students spoofing GPS signals Read More »

Firefox burns Chrome in our trustworthy browser poll

Our poll offered readers the chance to vote for one of the six most popular web browsers – Chrome, Firefox, Internet Explorer, Opera, Safari and Chromium – and asked which you trusted the most. Mozilla’s Firefox, the linear descendant of both Netscape Navigator and the original ‘graphical web browser’ the NCSA Mosaic, was a runaway

Firefox burns Chrome in our trustworthy browser poll Read More »

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet

Syrian Eagle told Mashable that Microsoft deserves what it got because it’s hawking data to US snoops and multiple governments. The SEA will publish proof of the allegations, Syrian Eagle said: “Microsoft is monitoring emails accounts and selling the data for the American intelligence and other governments. And we will publish more details and documents

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet Read More »

Windows XP retirement: Using Sophos products to secure XP

So here are some tips on how you can use Sophos products to maintain security for your yet-to-be-decommissioned XP systems during the transition period. 1. Run the Sophos endpoint With the Sophos endpoint you will of course get our award-winning anti-malware scanner, but you’ll also get Host Intrusion Prevention System (HIPS), Application Control, and Patch

Windows XP retirement: Using Sophos products to secure XP Read More »

Watch where you plug in, folks – researchers hack iPhones with a charger

This is according to the abstract of a briefing to be given at the upcoming Black Hat USA conference. The attack, dubbed “Mactans“, succeeded in compromising latest generation devices with the latest version of iOS. It led to a persistent infection with software of the attacker’s choice, invisible to the phone’s user thanks to built-in

Watch where you plug in, folks – researchers hack iPhones with a charger Read More »

Mike Valentine Named a Top IT Mid-Market Executive by CRN

This list was conceived to put a spotlight on the professionals driving one of the most important customer segments in the industry today. These executives were nominated by peers, colleagues, customers and partners because of the strong relationships they have built with midmarket customers, for their leadership, strategic thinking and solution excellence they demonstrate. Valentine

Mike Valentine Named a Top IT Mid-Market Executive by CRN Read More »

Infographic: Timeline shows 10 years of mobile device malware (2004-2014)

The current total of 650,000+ pieces of Android malware is up by approximately 600% from last January. Check out our mobile malware timeline below for our picks for the most important developments of the past decade, from the birth of mobile malware to today. Mobile Security Threat Report It’s been 10 years since the first

Infographic: Timeline shows 10 years of mobile device malware (2004-2014) Read More »