Sophos announces the SPAMPIONSHIP league highlighting the worst offending countries for spam

Every quarter Sophos announces the SPAMPIONSHIP league highlighting the worst…


What do IT managers rate as their #1 firewall issue today? Our survey says…

Back in the summer we ran a little survey on SpiceWorks and almost 400 Small…


Dropbox accounts breached. Ιs your data safe in the public cloud?

Dropbox usernames and passwords were leaked online this week. It’s the…


Sophos Strengthens Network Security Portfolio to Meet the Diverse Needs of Today’s Businesses

Sophos announced additions to its range of SG Series firewall/UTM appliances,…


Sophos Advances Cloud, Mobile, and Web Security with Acquisition of Mojave Networks

Sophos announced that it has acquired cloud-based security firm Mojave Networks…


Infocom World Caravel Hotel 21 Oct 2014

InfoCom World Congress is the largest event on digital technologies in SE…


With EU Data Protection Regulation on the horizon, will companies be ready?

A lot has changed since 1995, the last time a major European law…


Ipoque at Mobile World Congress 2013

a conference featuring prominent Chief Executives representing mobile…


Jacarta's Go-Probe Sensor range expanding!

coverage of your Jacarta solution by using Vibration Sensors with Adjustable…


Sophos announced Sophos Antivirus for NetApp 3.0!

The new release also brings reliability improvements and support for Windows…


GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy!

What’s a CSR? If you have ordered an SSL Certificate before, you were…


New Apple iPhone 5s to feature "Touch ID" fingerprint authentication

The authentication system, based on a new material for the home button and a…


Apple iCloud - 3 tips for keeping your photos and other data safe

Of course, it isn’t just film stars who have sensitive data on their…


How malware works: Anatomy of a drive-by download web attack

In the spirit of sharing our knowledge, we’d like to show you a pretty…


WD and Baidu Partner on Cloud Service Integration

WD’s My Cloud personal cloud drives, available now in China in capacities…


$80 million yacht hijacked by students spoofing GPS signals

But those signals were not authentic, and the ship was not on course. The…


Life after TrueCrypt: 5 tips for better data security

TrueCrypt’s sudden demise Despite being nominally open source software,…


SophosLabs: Android malware intercepts SMS messages to steal banking info

One of our SophosLabs researchers, Anna Szalay, made an interesting discovery…


Sophos announced the appointment of Mary Winfield as Senior Vice President

“Our goal of ‘Security made simple’ can only be fully…


Facebook pays $20K for easily exploitable flaw that could have led to account hijackings

As it is, Whitten explains, Facebook gives users the option of linking their…


UTM Series appliances. Our best sellers ever!

UTM Series appliances will remain an important part of our hardware appliance…


NSA secretly funding code-breaking quantum computer research

Quantum computing hinges, very broadly, on allowing individual bits (called…


Sophos honoured with Partnership Award from Queensland Police Service

Steve Gollschewski, Deputy Commissioner, Strategy, Policy and Performance…


AV-Test results show Sophos beats Kaspersky, Trend, McAfee and Symantec in stopping Mac malware

For the first time, AV-Test has released test results comparing malware…


Sophos Awarded 5 Star Rating in CRN 2014 Partner Program Guide

A ‘channel-first, channel-focused’ company, Sophos continues to…


WD Introduces New Ultra-Compact Network Storage Plus Servers, WD Sentinel DS5100 and DS6100

“WD is using enterprise-class components to build a new family of network…


Would you tell Google your Wi-Fi password? You probably already did...

Instead of just reinstalling your favourite apps and starting afresh, your new…


Spam-Bot Invaders: Which countries send the most spam?

When you consider the country’s huge online population, it’s not…


UTM and next-gen firewalls: What’s the difference? (Infographic)

As we explain below, next-generation firewalls are typically defined as…