PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Life after TrueCrypt: 5 tips for better data security

TrueCrypt’s sudden demise Despite being nominally open source software, TrueCrypt was always a bit secretive. Unlike many free, open source projects, the main developers and maintainers were unknown to the community. Someone, apparently one of the maintainers of TrueCrypt, shut down the project, claimed the product was not secure, and replaced it with a modified […]

Life after TrueCrypt: 5 tips for better data security Read More »

The Dirty Dozen spamming countries – introducing the SophosLabs SPAMMIERSHIP League Tables!

Likewise, the three countries that took their place in the top flight all came up from the 13-24 range. And, just like in your favourite football league, the majority of the high-flyers stayed put at the top. But is it so surprising that the USA is the Man United of the SPAMMIERSHIP, “winning” as often

The Dirty Dozen spamming countries – introducing the SophosLabs SPAMMIERSHIP League Tables! Read More »

WD Launches Fourth Generation WD Arkeia Network Backup Appliances

The new line up consists of four rack-mount appliance models with larger internal disk capacities, faster processors, increased memory, and integrated solid state drives (SSDs) to shorten backup time and accelerate data recovery. The bundled WD Arkeia v10.1 software delivers new support for “seed and feed” technology to support hybrid cloud backups. This allows companies

WD Launches Fourth Generation WD Arkeia Network Backup Appliances Read More »

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication

The authentication system, based on a new material for the home button and a metal sensor ring around it, has been the subject of numerous rumours and leaked photos and specs already. Speculation about Apple’s interest in fingerprints goes back at least as far as 2009, resurfaces each time a new version of the iPhone

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication Read More »

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy!

What’s a CSR? If you have ordered an SSL Certificate before, you were most likely asked to provide a CSR. The CSR is used to deliver the public key that your server will use to identify itself. Generating a CSR can be a hurdle for non-technical staff that aren’t always familiar with the command lines

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy! Read More »

Sophos announced Sophos Antivirus for NetApp 3.0!

The new release also brings reliability improvements and support for Windows Server 2012 and Windows Server 2012 R2. SAV for NetApp is also included in the following endpoint products and suites: Endpoint Protection AdvancedEnduser ProtectionEnduser Data SuiteEnduser Web SuiteComplete Security Suite To learn more, visit the Sophos for Network Storage page or download the free

Sophos announced Sophos Antivirus for NetApp 3.0! Read More »

Secure Google Docs email results in mailbox compromise

The email reads:     Hello,    A Secure Document was sent to you by your financial institute using Google Docs.    Follow the link below to visit Google Docs webpage to view your Document    Follow Here. The Document is said to be important.    Regards.    Happy Emailing,    The Gmail Team Phishing emails aren’t exactly rare, but this one

Secure Google Docs email results in mailbox compromise Read More »