PRODUCTS

Cyber Security Elements by NSS

January 2013

$80 million yacht hijacked by students spoofing GPS signals

But those signals were not authentic, and the ship was not on course. The signals were in fact being sent from the White Rose’s upper deck by University of Texas/Cockrell School of Engineering graduate students Jahshan Bhatti and Ken Pesyna. A team from the school had been invited aboard while the White Rose sailed from […]

$80 million yacht hijacked by students spoofing GPS signals Read More »

Firefox burns Chrome in our trustworthy browser poll

Our poll offered readers the chance to vote for one of the six most popular web browsers – Chrome, Firefox, Internet Explorer, Opera, Safari and Chromium – and asked which you trusted the most. Mozilla’s Firefox, the linear descendant of both Netscape Navigator and the original ‘graphical web browser’ the NCSA Mosaic, was a runaway

Firefox burns Chrome in our trustworthy browser poll Read More »

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet

Syrian Eagle told Mashable that Microsoft deserves what it got because it’s hawking data to US snoops and multiple governments. The SEA will publish proof of the allegations, Syrian Eagle said: “Microsoft is monitoring emails accounts and selling the data for the American intelligence and other governments. And we will publish more details and documents

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet Read More »

Windows XP retirement: Using Sophos products to secure XP

So here are some tips on how you can use Sophos products to maintain security for your yet-to-be-decommissioned XP systems during the transition period. 1. Run the Sophos endpoint With the Sophos endpoint you will of course get our award-winning anti-malware scanner, but you’ll also get Host Intrusion Prevention System (HIPS), Application Control, and Patch

Windows XP retirement: Using Sophos products to secure XP Read More »

Watch where you plug in, folks – researchers hack iPhones with a charger

This is according to the abstract of a briefing to be given at the upcoming Black Hat USA conference. The attack, dubbed “Mactans“, succeeded in compromising latest generation devices with the latest version of iOS. It led to a persistent infection with software of the attacker’s choice, invisible to the phone’s user thanks to built-in

Watch where you plug in, folks – researchers hack iPhones with a charger Read More »

Mike Valentine Named a Top IT Mid-Market Executive by CRN

This list was conceived to put a spotlight on the professionals driving one of the most important customer segments in the industry today. These executives were nominated by peers, colleagues, customers and partners because of the strong relationships they have built with midmarket customers, for their leadership, strategic thinking and solution excellence they demonstrate. Valentine

Mike Valentine Named a Top IT Mid-Market Executive by CRN Read More »

Infographic: Timeline shows 10 years of mobile device malware (2004-2014)

The current total of 650,000+ pieces of Android malware is up by approximately 600% from last January. Check out our mobile malware timeline below for our picks for the most important developments of the past decade, from the birth of mobile malware to today. Mobile Security Threat Report It’s been 10 years since the first

Infographic: Timeline shows 10 years of mobile device malware (2004-2014) Read More »