PRODUCTS

Cyber Security Elements by NSS

January 2013

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet

Syrian Eagle told Mashable that Microsoft deserves what it got because it’s hawking data to US snoops and multiple governments. The SEA will publish proof of the allegations, Syrian Eagle said: “Microsoft is monitoring emails accounts and selling the data for the American intelligence and other governments. And we will publish more details and documents […]

SEA hijacks Microsoft Twitter accounts, Xbox support blog and Technet Read More »

Windows XP retirement: Using Sophos products to secure XP

So here are some tips on how you can use Sophos products to maintain security for your yet-to-be-decommissioned XP systems during the transition period. 1. Run the Sophos endpoint With the Sophos endpoint you will of course get our award-winning anti-malware scanner, but you’ll also get Host Intrusion Prevention System (HIPS), Application Control, and Patch

Windows XP retirement: Using Sophos products to secure XP Read More »

Watch where you plug in, folks – researchers hack iPhones with a charger

This is according to the abstract of a briefing to be given at the upcoming Black Hat USA conference. The attack, dubbed “Mactans“, succeeded in compromising latest generation devices with the latest version of iOS. It led to a persistent infection with software of the attacker’s choice, invisible to the phone’s user thanks to built-in

Watch where you plug in, folks – researchers hack iPhones with a charger Read More »

Mike Valentine Named a Top IT Mid-Market Executive by CRN

This list was conceived to put a spotlight on the professionals driving one of the most important customer segments in the industry today. These executives were nominated by peers, colleagues, customers and partners because of the strong relationships they have built with midmarket customers, for their leadership, strategic thinking and solution excellence they demonstrate. Valentine

Mike Valentine Named a Top IT Mid-Market Executive by CRN Read More »

Infographic: Timeline shows 10 years of mobile device malware (2004-2014)

The current total of 650,000+ pieces of Android malware is up by approximately 600% from last January. Check out our mobile malware timeline below for our picks for the most important developments of the past decade, from the birth of mobile malware to today. Mobile Security Threat Report It’s been 10 years since the first

Infographic: Timeline shows 10 years of mobile device malware (2004-2014) Read More »

Top 10 Reasons to Choose APV Series Application Delivery Controllers (ADCs)

Here are the Top 10 reasons to choose Array’s APV Series Application Delivery Controllers (ADCs). Today, many industries and enterprises are looking to simplify and optimize business operations. Array’s high-performance technology is the first step towards achieving that goal. Designed to solve real-world business and organization problems, Array’s solutions can dramatically increase employee productivity and business agility

Top 10 Reasons to Choose APV Series Application Delivery Controllers (ADCs) Read More »