News
We also found out that the Heartbleed bug is in a version of the OpenSSL software that’s two years old — so this vulnerability could have been attacked for a very long time by someone with the resources to exploit it.
Sophos security experts helped us to understand Heartbleed and what it means, how to protect yourself, and why we should all be thankful for open source software, even if it’s not perfect.
Chester Wisniewski, Sophos senior security advisor, let us in on what Heartbleed is and why it’s so important for security on the Internet. Chet explained that OpenSSL sends a small packet of data back and forth between web servers to make sure the connection is still working, what’s called a TLS Heartbeat.
Only now it turns out that web servers could be tricked into sending huge amounts of system-stored data in response to a Heartbeat ping — data which could include passwords and encryption keys. In an opinion column published on CNN.com, Chet described how two-thirds of all websites were vulnerable to Heartbleed. Fortunately, most major Web services have already applied fixes to the affected Web servers and services. The bad news is that smaller websites as well as many companies’ products that rely on OpenSSL may linger for many more years without a fix.
Chet told BuzzFeed that an even bigger concern is who might have known about the Heartbleed bug before the rest of us caught on — and the most likely organization to know would be the U.S. National Security Agency (NSA), which has the means and an interest in finding such vulnerabilities.
“That’s exactly what the leaked NSA programs are supposed to do: Find the flaws, exploit them and never tell anyone,” Chet said. According to Chet, the “open” part of OpenSSL means this vital security software is maintained by volunteer researchers, not commercial interests. And that means we should be focusing our attention on supporting the open parts of the Internet that we rely on for freedom of communication.
All of us have come to rely on the Internet socially, politically and economically. The billions of dollars a year being made by the tech giants would not be possible without the millions of donated hours that maintain free and open software like OpenSSL, Linux, Apache Web server, and Postfix mail server.
You can read the original article here.
Here are the Top 10 reasons to choose Array’s APV Series Application Delivery Controllers (ADCs). Today, many industries and enterprises are looking to simplify and optimize business operations. Array’s high-performance technology is the first step towards achieving that goal. Designed to solve real-world business and organization problems, Array’s solutions can dramatically increase employee productivity and business agility while streamlining network management and delivering dramatic cost savings. With the advent of virtualization, public and private clouds, the explosion in mobile traffic and the move towards new standards including IPv6 and 2048-bit encryption, modern application delivery controllers must provide performance and scalability in line with the demands of mobile and cloud computing and the agility to extract maximum efficiency and ROI from application infrastructure.
Array APV Series application delivery controllers address the challenges faced by enterprise, service provider and public sector organizations in the areas of application and cloud service delivery. Available as purpose-built appliances or software engineered for virtual environments, Array ADCs combine cutting-edge performance and scalability with transformative features at industry-leading price points, creating unmatched value and ROI as compared to brand name alternatives.
Top 10 Reasons to Choose APV Series Application Delivery Controllers (ADCs)
1) Superior Performance
Delivers 99.999% application availability, up to 5x application acceleration and provides a first line of defense for Web-enabled applications and cloud services.
2) Management Integration
Array’s eCloud™ API provides a script-level interface for cloud management systems.OpenStack integration allows rapid integration and control of Array technology.
3) Lowest Cost per SSL TPS
Typically 30 – 70% lower cost than similar models for 2048-bit SSL across the complete APV Series product line.
4) IPv6 Migration
Array’s DNS64/NAT64 allows organizations running IPv6 networks to access IPv4 networks, servers and content. Array’s SLBPT allows organizations with an IPv4 Web presence to support access from IPv6 clients.
5) Easy Traffic Management
Advanced Layer 7 policy engine, SpeedPolicy, offers point-and-click WebUI configuration executed at the system level for agility and performance.
6) High-Performance Features
Since features are executed at the system level, APV appliances maintain unmatched levels of performance with multiple, concurrent features enabled.
7) Multi-Layer Security
WebWall provides the first line of defense for Web-based cloud apps and shields Web Application Firewalls from brute force attacks and unauthorized requests.
8) Great Support
Array’s pre- and post-sales engineers and customer support are committed to strive for excellence and continual improvement in quality.
9) Flexible Platform Options
Physical, virtual or multi-tenant – APV Series offers all three options. And AVX10650 is a true multi-tenant ADC, with dedicated SSL, I/O and compute resources for up to 8 instances.
10) Established Company
With a 10-year record and proven at thousands of worldwide customers, Array application delivery networking solutions are recognized for industry-leading performance and value.
The research evaluated thousands of website URLs of organizations that utilized the GlobalSign SSL Configuration Checker; many of these organizations were looking to assess the strength and quality of their SSL configurations. Statistics revealed that in the first quarter of 2013 over 6,000 sites used the tool to evaluate the effectiveness of their SSL, and 269 of those sites used the remediation guidance provided by GlobalSign to improve and, in some cases, strengthen the security of their sites within a matter of minutes.
Upon visiting GlobalSign’s SSL Configuration Checker, powered by Qualys SSL Labs, organizations enter their website addresses and instantly receive a letter grade for their configuration. The grading system has three steps. First, the site’s SSL certificate is examined to confirm that it is trusted and valid. If a server fails this step it is automatically given a zero. Next, the server configuration is tested in three categories:
1) protocol support,
2) key exchange support and
3) cipher support.
Finally, a score between 0 and 100 is assigned to the site. The grading scale is as follows:
• score ≥ 80 A
• 65 ≤ score ≤ 79 B
• 50 ≤ score ≤ 64 C
• 35 ≤ score ≤ 49 D
• 20 ≤ score ≤ 34 E
• score
The research revealed that 50 percent of 269 websites that used the GlobalSign SSL Configuration Checker strengthened the effectiveness of their SSL configuration grades in 30 minutes or less. Fifteen percent improved from a B, C, D or F to an A grade in less than two hours.
Notable statistics for the 269 improved websites:
• 172 organizations improved their grade to an A overall – 63%
• 13 organizations improved their F grade to an A, B, or C – 42%
• 95 organizations improved their B grade to an A – 35%
“The improvement in website security is certainly encouraging for us to see, but this is the absolute tip of a very big, fast-moving and dangerous iceberg,” said Ryan Hurst, chief technology officer of GlobalSign. “Administrators can use the SSL Configuration Checker to greatly improve and remediate the security of poorly configured sites, but it is the awareness of this free and easy tool that we are trying to drive. Both small and large organizations with websites must adopt best practices, but first they have to identify the strengths and weaknesses of their sites’ SSL configuration.”
Alexa 100 Sites Evaluated:
In addition to the findings derived from inbound SSL Configuration Checker use, GlobalSign evaluated the SSL effectiveness of the Alexa Top 100 websites. The research revealed the following:
• Over half (51%) of the websites received an A.
• Twenty-five percent received a B and 5 percent scored a C.
These grades are proof that while just over half of the world’s top sites, and the enterprises behind them, are providing effective security, there is ample room for improvement.
Overall SSL Configuration Checker Evaluation results of the Alexa Top 100:
Click here to see the original article.
Jan
Recent headlines and mounting evidence suggest that cyberattacks on Critical Infrastructure (CI) systems are increasing as cybercriminals have identified electric utility grids as prime targets for disruption activities. As a result, CI cybersecurity has become a prime concern for governments and citizens alike. The paper focuses on the history of the electric industry, how cybersecurity standards have emerged, what those standards are and how they can be used by other CI sectors to strengthen security and reduce the risk of harmful cyberattacks.
“PKI is a robust technology that provides a secure, scalable and cost-effective method to securely authenticate digital identities on large and complex networks such as those that manage business processes for the wholesale electric market. However, due to the many implementation details involved, if the technology is not executed correctly it can also produce a vulnerable system,” said Kee. “NAESB members have worked together to produce a standard for the Wholesale Energy Sector that is based on best practices, proven management techniques and advanced digital certificate technologies.“
In the wake of increasing attacks, U.S. CIs are stepping up efforts to amplify their cybersecurity and strengthen their defenses. In fact, the white paper notes that in President Obama’s recent Executive Order, the National Institute of Standards and Technology (NIST) was directed to lead the effort to develop a cybersecurity framework that would consist of adopting industry best-practices wherever possible. “As part of NIST’s draft cybersecurity framework of best practices, guidelines and standards, the NAESB standard on PKI stands a good chance of being applied to other CI sectors,” says Lila Kee.
All CIs are managed, controlled and accessible via Internet-connected systems, making them vulnerable to cyberattacks. This white paper details how ISOs in the energy sector have recognized the value of cybersecurity frameworks, have adopted standards developed by NAESB and have demonstrated that standards can be developed using shared expertise from both the public and private sectors – setting a framework for all CI sectors.
“It has become increasingly clear that cybercriminals are targeting the critical infrastructure in an attempt to disrupt our way of life. For this reason, NAESB made it a priority to establish PKI standards in order to fortify our cybersecurity framework,” said Rae McQuade, President of NAESB. “In establishing these standards we hope to provide a strong cybersecurity strategy so that we may best protect the business practices related to the electricity market that are a critical part of the everyday lives of our citizens.”
To read GlobalSign’s white paper visit the page here.
James Lyne, Global Head of Security Research, Sophos, said: “Sophos has partnered with Government to support Cyber Streetwise because we believe it’s imperative for both consumers and small businesses to take action to protect themselves online.”
“Consumers and SMEs alike are finding new ways to interact online, including via a greater range of devices, but with this enhanced technology comes risk. SophosLabs finds over 30,000 new infected websites distributing malware every day and, contrary to popular belief, the majority – around 80% – are legitimate small business websites that have been hacked. It’s therefore vital that small businesses in particular get the basics of security right – from installing antivirus to regularly updating and patching software, using complex passwords and protecting data.”
The Cyber Streetwise website – www.cyberstreetwise.com – offers a range of interactive resources for SMEs and consumers to gain impartial advice on how to protect themselves online. Sophos, which has provided security expertise and content for the Cyberstreetwise site, is also pushing visitors from its own dedicated web page – www.sophos.com/cyber-street – to the Cyber Streetwise website.
James Lyne continued: “Those who don’t put basic security measures in place are leaving themselves exposed to attackers capable of silently installing malicious code on their systems without permission. We are proud to have been asked to support and to provide content for Cyber Streetwise, which will play a vital role in encouraging businesses and consumers to adopt safer behaviours online and to take the fight to cyber criminals by improving their online security.”
Cyber Streetwise is urging people to take five actions in order to protect themselves and others from cyber crime:
1. use strong, memorable passwords
2. install anti-virus software on new devices
3. check privacy settings on social media
4. shop safely online – always ensuring to check online retail sites are secure
5. download software and application patches when prompted
You can read the original article at here.
Authorities have apparently taken control of the Gameover bots and seized its command servers over the weekend, effectively freeing 300,000 of the 500,000 to 1 million infected Windows computers. Even better, they’ve found the crime ring behind the botnet and have charged alleged Russian mastermind Evgeniy Mikhailovich Bogachev with hacking, different types of fraud, money laundering and conspiracy.
Gameover Zeus, for those who’ve never heard of it in the past, is a P2P malware that pilfers banking information and initiates wire transfers to overseas bank accounts. It’s typically propagated through spam emails disguised as bills or invoices embedded with malicious links — the kind you tell your grandparents to never click. Once Gameover worms its way into a system, that computer becomes part of the extortion ring’s global network of infected machines, which funnel ill-gotten info back to the criminals. The perpetrators would sometimes also install compromised PCs with Cryptolocker, a “ransomware” that takes users’ files hostage until they pay up. According to the FBI’s estimates, the criminals have stolen over $100 million using both Gameover and Cryptolocker. But whether that’s enough for Bogachev to stand trial in the US (home to 25 percent of the affected machines) remains to be seen, as Russia does not extradite accused criminals. For now, all the authorities can do is spread word about the botnet and help people remove it from their computers.
The next stage – the part of the operation that is the duty of all of us – is to dismantle the rest of the botnet, by progressively disinfecting all the zombie-infected computers that made the Gameover and Cryptolocker “business empires” possible in the first place. US-CERT has come up with a whole list of free tools so you can do just that, and (if you are the go-to person for IT problems amongst your friends and family) so that you can help others, too. The Sophos Virus Removal Tool is amongst the recommended cleanup utilties. It’s a free download; you don’t have to uninstall your existing anti-virus first; and it detects and cleans the same malware, including rootkits, that Sophos Anti-Virus knows about, not just CryptoLocker.
Jan
Bolstered Channel Team
Sophos has recently strengthened its channel team with the appointments of Kendra Krause, Americas channel chief and Karen Delaney, Australia & New Zealand channel chief.
Prior to Sophos, Krause served most recently as Fortinet’s Channel Sales and Operations vice president. She previously served in channel sales and marketing roles at SonicWall, WatchGuard and CDW. Delaney spearheaded channel strategies at IBM, Acer and Dell/SonicWALL. Since joining the company, she has played an integral part in bringing Distribution Central and Connector Systems onboard as Sophos’ first distribution partners in Australia and New Zealand.
Channel Honors
Sophos has received considerable recognition for both its channel team and channel program. Included among this year’s honors:
- CRN UK’s Channel Sales & Marketing Award—The Sophos Partner Program was declared “best in the UK”. This award recognizes and rewards the achievements of those individuals and teams responsible for making the UK IT channel so successful.
- CRN’s 2013 Top Women of the Channel—Several Sophos’ channel leaders were among the honorees: Kendra Krause, vice president of Americas channel sales, Amy Gelpey, senior channel marketing manager, and Regina Vignone, director of sales.
- CRN’s Power 100 Most Powerful Women of the Channel—Kendra Krause was among the elite list of executives recognized for their channel achievements.
- CRN’s 2013 5-Star Partner Rating—The 5-Star Partner Program rating recognizes an elite subset of Partner Program Guide vendors that give solution providers the best partnering elements in their channel programs.
- CDW—Sophos was named Sapphire Partner of the Year for 2012; Sophos was one of CDW’s fastest-growing partners of the year.
Key Channel Recognition for Sophos UTM
The company was also highlighted in the 2013 CRN Annual Report Card (ARC). This prestigious study is considered the definitive benchmark for measuring excellence in the IT Channel community and recognizes the top-rated vendor partners in the industry. Sophos was given the highest honors for product innovation in the Network Security Appliances category for its unified threat management (UTM) solution, Sophos UTM. Winners were announced live at an awards reception on Tuesday, August 20, 2013, at the XChange 2013 event in Washington, D.C.
“At Sophos, every year is the year of the partner, but this year in particular has truly demonstrated our ‘channel-first’ commitment—from hosting the largest partner conferences in our history to a game-changing new MSP program, our focus is our channel,” said Mike Valentine, senior vice president, worldwide sales, Sophos. “We offer partners the most complete IT security value proposition—proven and award-winning security solutions that are simple to use, combined with the industry’s most powerful channel program. And with an aggressive roadmap that features an impressive array of offerings, we’re very excited about delivering partners even more value in the coming months to help them grow.”
To learn more about the Sophos Partner Program, please click here or visit http://www.sophos.com/en-us/partners.aspx.
Jan
At RSA, Schiappa managed a business unit with annual revenue over $500M, and he had responsibility for engineering, product management, product marketing, an anti-fraud command center, and data center operations. At Sophos he will have full product responsibility for the company’s broad portfolio of end user security offerings, including endpoint, mobile, server protection, and encryption and data protection products.
Kris Hagerman, chief executive officer for Sophos, said, “I’m pleased to welcome Dan to Sophos. He has deep experience in the IT security landscape, and his background, drive and passion make him the perfect fit to accelerate our end user security strategy of delivering world-class on-premise and cloud-managed security solutions to protect our customers across their broad diversity of endpoints. We continue to add some of the brightest minds to Sophos as we look to become the world leader in delivering complete security without complexity for organizations around the world.”
Prior to EMC, Schiappa was at Microsoft, where he held several GM positions, including Windows security, Microsoft Passport/Live ID, and the company’s online display advertising platform. He also led strategy and corporate development for the Entertainment and Devices division. As head of Microsoft’s security division, Dan led a 400-person product team responsible for developing the security infrastructure for Windows Vista/7 and Windows Server operating systems. Also during his tenure, he was the key business leader for Microsoft’s BitLocker and Rights Management services. Prior to Microsoft, Dan was the CEO of Vingage Corporation, a video server startup acquired by L3 Mobilevision, and was an executive at PictureVision, an online digital imaging startup acquired by Kodak. Dan also held key technical roles at Informix Software and Oracle Corporation.
Schiappa said, “Sophos is poised to lead the charge for a more effective and simpler approach to securing users and data. The cloud will enable IT professionals and our partners to accelerate security deployment and simplify management in an ever changing landscape of malware, targeted attacks, and other security threats. And the continued innovations in end user and data protection will better safeguard enterprises of all sizes, whether they choose cloud or more traditional on-premise management. It’s an exciting time to be at Sophos, and I’m thrilled to be part of the team.”
Jan
Sophos Mobile Control
Protecting millions of mobile devices across tens of thousands of customer accounts, the latest release of Sophos Mobile Control (SMC) features an easy-to-use web-based console—deployed either on-premise or as a Service—to manage, protect and secure data. It delivers effective mobile device management to control the devices that access corporate systems. Using Sophos Mobile Control, IT teams can equally enforce regulatory compliance as well as corporate-mandated policies for complete data and device security without complexity. SMC supports Windows Phone 8, Android, and iOS 7, Apple’s latest mobile operating system.
In a recent research note by IDC, 24% of SMB organizations currently utilize an MDM solution to govern and manage their mobile devices. The study identified Sophos Mobile Control as the most-deployed MDM product among all survey respondents at 25%. In addition, last month, Sophos was named a leader in the Gartner Magic Quadrant for Endpoint Protection Platforms, and recently received a positive review from the 451 Group.
“We’re thrilled by the continued adoption of our MDM solutions. As the IDC report confirms, the market opportunity is huge, and Sophos Mobile Control is already at the head of the pack,” said Dan Schiappa, Senior Vice President and General Manager, Enduser Protection Group, Sophos. “As organizations look to define and refine BYOD policies and comply with regulations and compliance issues, Sophos continues to be a trusted provider for endpoint, network and server protection solutions.”
You can read the original article here.
Jan
The mobile workforce are the super productive bunch. They are the ones pushing the envelop of BYOD. For the mobile workforce, balancing work and life can mean that they check corporate email on a personal device, and browse the Internet using a corporate laptop while traveling.
Many IT professionals would agree that empowering these mobile workers with the tools they need while ensuring security can be a tough balancing act. Here are a few tips to help you secure your mobile workforces without overworking the IT folks.
1. Choose a cloud-based security subscription service that offers security software and policy updates anywhere without slowing down users.
Let’s face it, when your users are on the road, how often do they use a VPN to connect? If you rely on VPN connection to send security updates or refresh policies, you’ll be constantly behind.
2. Take advantage of security software web filtering capabilities that block malicious and web-borne threats before they reach the computer, as well as enforce proper usage policy.
When your mobile workers are on the road, it is expected that they would connect to the hotel’s Wi-Fi to browse the Internet to check the sports page on their work iPad.
The key is to keep them protected from web-borne threats. Take advantage of endpoint enforced web protection capabilities built-in to the local security agent. This way, you avoid latency and eliminate the need to backhaul traffic using a VPN connection. (We already know that people don’t always connect to the VPN before they browse the Internet!)
3. Select a solution that will protect Windows and Mac computers equally with a single policy.
Take a look at an airline lounge and count how many Macbooks are being used. According to our recent survey, 10% of laptop computers on the corporate network are Macs.
Get a security solution that will protect Windows and Mac equally. To reduce IT’s workload, it is also important to ensure that you can manage both with a single policy engine. This way, you will only have to configure policy once and it works automatically on both Windows and Mac OS X.
4. To protect data and ensure compliance, be sure to encrypt data on both Windows and Mac.
We all know encryption is essential for mobile workers, yet 80% of corporate computers are un-encrypted. Many mobile workers refuse to get encryption on their laptops out of concerns of slow speeds and longer boot time.
Select an encryption solution that works on both Windows and Mac, and with high performance that won’t slow down your users.
5. Select a single solution that gives you visibility into all the devices your remote users are using, including Windows or Mac laptops and mobile devices.
Mobile users today use an average of three devices to get their work done. Ideally, use a solution with a user-centric view, so when you are trouble shooting for a mobile worker, you can easily see the events, devices used and policy applied to the specific individual.
About Sophos Cloud
Businesses and IT managers have a simple choice – Sophos Cloud. There’s no server to install and the management console is hosted in the cloud. So, you’ll be up and running in just 60 seconds.
1) Windows, Mac and mobile device security in a single, integrated console
2) User-centric pricing, policy and reporting
3) Comprehensive protection without complexity
You can read the original article, here.
Jan
By offering this service, GlobalSign hopes to encourage the use of SSL in application development and the growth of security best-practices.
Through GlobalSign’s commitment to the open-source community, projects are eligible to receive one free Wildcard SSL Certificate valid for as long as the project meets minimum requirements. Open-source software projects that allow developers and the general public to freely access the source code have become very popular and are looked upon by many as leaders in the industry, representing an important segment of the technology community. Offering SSL Certificates will allow developers to improve the trust and security of their projects, which people around the world rely on. GlobalSign hopes this partnership can also make a difference by setting an example in how SSL is deployed today.
“We are delighted to show our commitment to the open-source community by offering free SSL Certificates to these projects,” said Ryan Hurst, chief technology officer, GMO GlobalSign, Inc. “We believe this effort will not only help the developers and users of open-source projects but also encourage the adoption of industry best-practices in the use of SSL.”
To qualify for a free Wildcard SSL Certificate from GlobalSign, the software project must use a license approved by the Open Source Initiative. GlobalSign will also require that projects maintain secure SSL configurations. Projects can quickly and easily evaluate their SSL strength by using the GlobalSign SSL Configuration Checker, which currently checks for over 30 common problems relating to configuration and provides recommendations on how to fix them, thus making it easy to achieve a secure configuration.
Those in the open-source software community who are interested in obtaining a free Wildcard SSL Certificate from GlobalSign may enroll for it by visiting https://www.globalsign.com/ssl/ssl-open-source/.
Click here to see the original article.
Jan
“While many security experts are aware of the high level trends, few have recognized their significance,” said James Lyne, global head of security research at Sophos. “If 2013 has taught us anything, it is that traditional security controls are struggling. These new behaviors are forcing the industry to adapt and change, and widely held best practices must be reconsidered.”
The threat report highlights new security concerns ranging from stealthy malware tools that offer dynamic camouflage and provide attackers with long-term persistent access to users’ data, to the proliferation of connected devices that represent new and often ill-protected targets. Many new “Internet of Things” devices are becoming commonplace in our homes and everyday infrastructure, offering shadier cybercriminals the potential to impact our daily lives, rather than just the traditional theft of financial information.
“These trends are set to continue in 2014 as threats become even smarter, shadier and stealthier,” said Lyne.
In 2014 Sophos predicts greater focus from cybercriminals on high quality and convincing phishing and social engineering to compensate for harder-to-exploit operating systems like Windows 8.1; embedded devices (such as POS systems, medical systems and new “smart” infrastructure) will open old wounds as security mistakes eliminated in the modern PC environment are carelessly re-implemented; attacks on corporate and personal data in the cloud will continue to grow as providers struggle to refine the security strategy in this new computing platform; and malware for mobile is set to become as sophisticated as its PC relatives.
“It is clear in 2014 we need to be watching not just the evolution of existing attacks, but be prepared for dangerous new threats emerging that we haven’t previously dealt with,” said Gerhard Eschelbeck, CTO at Sophos. “As the industry adapts and enhances protection mechanisms to cover new devices and threats, this is increasingly becoming an issue for every member of society, not just for government and business.”
A full copy of the Security Threat Report 2014 containing more information and statistics on cybercrime in 2013, as well as top tips and predictions on emerging trends, can be downloaded here.
You can read the original article here.
Jan
Important: This article may continue to be updated with further advice. We therefore recommend you check back here regularly for new information.
Applies to the following Sophos product(s) and version(s)
- Sophos UTM
- Sophos Anti-Virus for VMware vShield
For information relating the vulnerability to other Sophos products see:
Is SafeGuard Enterprise affected by the recently identified OpenSSL leak in versions 1.0.1 to 1.0.1f (cve-2014-160)?
Is Sophos Mobile Control affected by the recently identified OpenSSL leak in versions 1.0.1 to 1.0.1f (cve-2014-160)?
What is the vulnerability?
The official CVE is tracked here and mentions versions of Open SSL used in some Sophos products (see below).
The vulnerability described uses a TLS heartbeat read overrun which could be used to reveal chunks of sensitive data from system memory of any system worldwide running the affected versions of OpenSSL – but only exposed services are immediately affected, as the bug allows to be read from the processes own memory.
For more information read our naked security blog article on the issue: Anatomy of a data leakage bug – the OpenSSL “heartbleed” buffer overflow
What versions of Open SSL are affected?
1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1.
What products are affected and how is the vulnerability fixed?
The table below lists all the affected Sophos products. Important: Though other products may use SSL these are not affected and no action is required.
If you use one or more of the products mentioned below use the table to guide you on what is required.
Sophos Product | Steps to fix |
UTM 9.1
UTM 9.2 |
A patch is available for the vulnerability in UTM 9.1. The overview steps are: Install the patch For detailed instructions see article 120851. |
UTM LiveConnect Servers | Patched April 9, 2014 |
UTM Manager 4.105 |
Patched in 4.106, available now. See: http://blogs.sophos.com/2014/04/10/sophos-utm-manager-up2date-4-106-released/ |
SAV for vShield |
A patch for version 1.1 will be made available early next week. |
Important: There are three primary requirements to patch the OpenSSL vulnerability, protect yourself from any future exploit attempts and to mitigate any security vulnerabilities if your certs have already been compromised
- Apply the OpenSSL Patch
- Regenerate all SSL certs
- Change all passwords
Where do I get the Patch and instructions to Renegerate all SSL Certs?
The currently available patches for UTM are listed in article Heartbleed: Recommended steps for UTM. We will add details on other patches as soon as possible. Check back HERE for updates.
a bogus message supposedly sent from Facebook Security.
According to Hoax-Slayer, the scam claims that Facebook is rolling out a new security feature to protect Page owners.
This supposed new security feature is dubbed the “Fan Page Verification Program”.
It does a nice job of flattering suck-up to entice victims into coughing up their Facebook login details, telling targets that they’ve had ever so many stolen Pages lately, and they simply can’t think of what to do about it except just, well, throw up their hands and Delete them all – yes, Delete those bad, bad Pages, with a capital “D”.
All the stolen Pages, that is, except yours, which, gosh, is so popular with its “High Quality Content”.
The message tells victims that they have to click a link and choose a 10-digit security code to complete the process.
Those who don’t comply will see their Page suspended permanently if the process isn’t completed by May 30, 2013, they go on to say.
Here’s an example of this scammy letter that Hoax Slayer posted on Friday:
Dear Facebook User,
You are receiving this message to notify you about the new security feature from Facebook called “Fan Page Verification Program”.
After many Fan Pages have been stolen lately leaving us no choice but Deleting them forever, we had to come up with an original solution about the Fan Page’s Security.
Luckily, your Fan Page, has a lot of likes and provides High Quality Content, which qualify it for this program.
To complete this process you must choose a 10-digit number (it can be any number) and that number will be assigned as your Security code”. This code will be the new passphrase for changing anything important for your Fan Page, like the Admin roles or other important settings.
Please be aware that this process it’s open only until 30.05.2013 and it’s mandatory to complete it. If you don’t, your Fan Page will be suspended permanently since it is not considered safe for the wide audience.
Please visit the link below to complete the process:
[Malicius Link]
Facebook Security
Anybody who falls for it and clicks on the link will be whisked away to a spot where they’re told to submit Facebook login details and the so-called 10-digit “Transferring Code”.
Click here to see the original article.
Jan
We began producing antivirus and encryption products nearly 30 years ago. Today our products help secure the networks used by 100 million people in 150 countries and 100,000 businesses. Our products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices.
All devices —managed easily through the cloud. What’s more, securing these devices is made possible through products that fit your precise needs. We ensure your network’s security by providing the one thing no one else can: Simplicity – arching the following three important IT security sections:
Network Protection
Who Needs This
Sophos UTM helps you consolidate your security without compromising its effectiveness. It’s security made simple, protecting your users everywhere while making security easier to deploy and manage.
What’s Protected
- All computers, mobile devices and servers on a network
- Branch offices and remote users connected with VPN
- Email and web servers and even Wi-Fi users
Products
- Unified Threat Management – The ultimate network security package.
- Secure VPN – Turn any location into a secure location.
- Secure Web Gateway – Complete web protection everywhere.
- Web Application Firewall – Uncommon protection from common threats.
- Next-Generation Firewall – This is where network threats go to die.
- Secure Wi-Fi – Super secure, super Wi-Fi.
- Secure Email Gateway – Simple protection for a complex problem.
Enduser Protection
Who Needs This
Our endpoint protection will keep data in and malware out—all within your antivirus budget. And we protect your mobile devices and servers.
What’s Protected
- All computers, mobile devices, and servers on a network.
- Encryption for devices and file shares.
- Mobile devices and laptops on the go.
Products
- Enduser Protection Suites – The all-in-one security suite.
- Mobile Control – Countless devices, one solution.
- Endpoint Antivirus – Essential protection for laptops & desktops.
- SafeGuard Encryption – Encryption everywhere.
Server Protection
Who Needs This
Our antivirus protection delivers more effective, faster protection across your network of physical or virtual servers.
What’s Protected
- Broad platform support for Windows, UNIX and Linux servers.
- Small memory footprint won’t slow you down. Our antivirus agent has low performance impact, and is optimized for virtualization.
- HIPS protection for Windows is easy to deploy and manage.
Products
- Server Security – Pro-server. Anti-virus.
- Network Storage Antivirus – High-tech security for high-tech storage.
- PureMessage – Good news for you. Bad news for spam.
Sophos President and CEO Kris Hagerman said, “Sophos is thrilled to join the many other technology leaders that call Silicon Valley home. A meaningful presence in Silicon Valley gives us a golden opportunity to capitalize on the technology trends and partnership opportunities that are so abundant in this area. Silicon Valley is a renowned global center for the disruptive innovation, top talent and strategic relationships that will help propel Sophos to the next level.”
Mike Valentine, senior vice president of worldwide sales and channel, said, “Sophos is a global company with global reach. Given our ‘Channel First’ sales strategy, it’s important that we have a strong physical presence in the areas that will drive the greatest opportunities. This is why we’ve expanded to the Bay Area, adding it to the other 40 offices we maintain around the world. Sophos is building a market-leading channel program, constantly recruiting and enabling top-notch partners to join our team. This new office provides more evidence of our growing investment in the North America IT security market.”
Meanwhile, the Sophos product development engine continues to hum. The company recently announced Sophos Cloud, an easy to deploy and simple to manage cloud-based service for endpoint protection. The latest version of Sophos Mobile Control delivers best-in-class mobile device management (MDM), enabling organizations of all sizes to use mobile devices such as iPhone, iPad, Android and Windows Phones, to get work done – simply, securely and reliably.
The company also continues to attract top industry talent, including John Keenan as vice president of North America Sales, Mary Winfield as senior vice president of Support, and Dan Schiappa as senior vice president and general manager of the Sophos End User Security Group.
You can read the original article here.
The Balance 50 features our advanced load balancing and failover. It supports PepVPN, so it can act as a SpeedFusion endpoint for branch VPN networking. Plus, it offers everything else customers love about the Balance 20/30. And the Balance 50 delivers speed and reliability to spare, even when individual connections slow down or drop out.
Download the datasheet for more information on the Peplink Balance 50 multi-WAN router. For pricing details and to stock up today, visit the online cart.
Jan
Increased migration to virtual servers and the ever-growing threat of attack on critical data are presenting new challenges to IT professionals, as they look to maintain high performance and density of servers, without compromising on security. Sophos Server Protection addresses these challenges by integrating agentless antivirus for vShield and full antivirus clients for Windows, Linux, Mac and UNIX into one centrally managed product.
“Servers need the best protection against malware, but managing that protection while maintaining server performance across a diverse environment has inevitably increased complexity and demands on time,” said John Shaw, vice president of product management, Sophos. “We’ve delivered on what matters – server performance and security. Sophos Server Protection provides a single, easy to use management console to assign policies, view alerts and generate reports across platforms. Even licensing, often the bane of IT professionals, is straightforward: one server, one license, any platform.”
Standalone and virtual systems use fewer resources with Sophos Server Protection than with conventional antivirus products. Agentless scanning via vShield Endpoint prevents scan and update storms, automatically protecting every Windows virtual machine on the host through a centralized virtual security appliance. Systems without vShield benefit from a full featured client optimized for performance. Advanced features, including HIPS, application control, and device control, are also included for select platforms.
Sophos Server Protection supports a broad range of server and virtualization platforms, including Windows, Linux, UNIX, Mac, Hyper-V, vSphere/ESX/ESXi and XenServer. It provides proven protection against known and unknown threats, supported by real-time communication with SophosLabs. The Windows client offers additional layers of security, including HIPS, application control and patch assessment.
“Sophos Server Protection is server security made simple, because at Sophos we believe good security shouldn’t have to require the undivided attention of the IT team to make it work. Sophos Server Protection secures your business’s critical assets, without sacrificing performance or adding unnecessary complexity,” concluded Shaw.
Sophos Server Protection will be showcased at VMworld, which takes place in San Francisco between August 25 and 29. Sophos is a VMware Elite Technology Alliance Partner.
Υou can read the original article here.
Jan
The firmware can be downloaded now from our Downloads page.
One area that is becoming increasingly popular with many users is Security. The equipment in Data Centres and Server Rooms is extremely valuable, and that information stored within those environments is often priceless. Jacarta’s solutions can monitor security in a number of ways using various sensors and products:
Security Sensor – The standard Security Sensor is a magnetic reed type sensor that can be used to send an alarm in the event of a door or window being opened.
Vibration Sensor – The Vibration Sensor is often fitted to glass panels and doors where forced entry is possible. As soon as vibration is detected – the sensor will trigger an alert.
PIR Sensor – Using Infra-Red technology, the PIR sensor will alert users to movement within the monitored environment.
The security sensor, vibration sensor and PIR sensor are all part of Jacarta’s Go-Probe sensor range and are therefore compatible with all of the company’s monitoring devices. To view the Go-Probe Sensor literature click here.
JCAM IR IP Camera – Installing a surveillance system can be beneficial in a number of ways. As well as providing a visual deterrent Jacarta’s IP Camera can also be used to monitor staff activity and provide evidence in the case of criminal activity. JCAM IR has a range of key features including night vision and motion sensing. View the product literature here.