PRODUCTS

Cyber Security Elements by NSS

Author name: admin9am

AV-Test results show Sophos beats Kaspersky, Trend, McAfee and Symantec in stopping Mac malware

For the first time, AV-Test has released test results comparing malware protection for Macs among 18 major security vendors. The results show a wide disparity in protection against Mac OS X malware. Sophos came out near the top with a 96.6% detection rate. Our Mac protection was better than Kaspersky, Trend Micro, Symantec and McAfee. You […]

AV-Test results show Sophos beats Kaspersky, Trend, McAfee and Symantec in stopping Mac malware Read More »

Would you tell Google your Wi-Fi password? You probably already did…

Instead of just reinstalling your favourite apps and starting afresh, your new device will know how to get online straight away, how to get into your Twitter account, and how many Angry Birds levels you haven’t conquered yet. Clearly, Google keeps a raft of configuration data on your behalf, because if you have the option

Would you tell Google your Wi-Fi password? You probably already did… Read More »

Sophos honoured with Partnership Award from Queensland Police Service

Steve Gollschewski, Deputy Commissioner, Strategy, Policy and Performance presented the award to Rob Forsyth, Director Sophos Asia Pacific, in recognition the team’s ongoing partnership with the Queensland Police Service, working closely with the community to provide education material for community groups, as well as hosting the Sophos Signature events to explore current and emerging issues,

Sophos honoured with Partnership Award from Queensland Police Service Read More »

NSA secretly funding code-breaking quantum computer research

Quantum computing hinges, very broadly, on allowing individual bits (called qubits) to contain superimposed values of zero and one, vastly increasing computing power. Its implications for cryptography, medicine, and research have made it a major goal for public services and private industry alike: DARPA has devoted years of funding to quantum computing research, and Google

NSA secretly funding code-breaking quantum computer research Read More »

Facebook pays $20K for easily exploitable flaw that could have led to account hijackings

As it is, Whitten explains, Facebook gives users the option of linking their mobile numbers with their accounts. Users then can receive updates via SMS and can also login using their phone number rather than their email address. Whitten found that when sending the letter F to Facebook’s SMS shortcode – which is 32665 in

Facebook pays $20K for easily exploitable flaw that could have led to account hijackings Read More »

Sophos announced the appointment of Mary Winfield as Senior Vice President

“Our goal of ‘Security made simple’ can only be fully realized when every interaction Sophos has with customers and partners exceeds their expectations,” said Kris Hagerman, chief executive officer of Sophos. “Mary has an extraordinary track record in building dynamic and high-impact customer care and customer support organizations, and we are thrilled to welcome Mary

Sophos announced the appointment of Mary Winfield as Senior Vice President Read More »

SophosLabs: Android malware intercepts SMS messages to steal banking info

One of our SophosLabs researchers, Anna Szalay, made an interesting discovery recently: a new type of Android malware that slips in through a security hole in the USB debugging feature that allows developers to modify their Android devices. Naked Security expert Paul “Duck” Ducklin reports that this malware can intercept your SMS text messages to

SophosLabs: Android malware intercepts SMS messages to steal banking info Read More »

Life after TrueCrypt: 5 tips for better data security

TrueCrypt’s sudden demise Despite being nominally open source software, TrueCrypt was always a bit secretive. Unlike many free, open source projects, the main developers and maintainers were unknown to the community. Someone, apparently one of the maintainers of TrueCrypt, shut down the project, claimed the product was not secure, and replaced it with a modified

Life after TrueCrypt: 5 tips for better data security Read More »