Phishers try flattery with Facebook Page owners

a bogus message supposedly sent from Facebook Security. According to…


How malware works: Anatomy of a drive-by download web attack

In the spirit of sharing our knowledge, we’d like to show you a pretty…


Life after TrueCrypt: 5 tips for better data security

TrueCrypt’s sudden demise Despite being nominally open source software,…


Peplink Balance 30 LTE. Unparalleled Uptime with LTE Backup

Embedded 4G model supporting 4G LTE for EU and worldwide GSM carriers and…


Smartphone PINs skimmed with microphone and camera

A new program, dubbed PIN Skimmer by its University of Cambridge creators, can…


Sophos Brings High Performance and Simple Management to Server Protection

Increased migration to virtual servers and the ever-growing threat of attack on…


Microsoft extends anti-malware for XP. Here’s why you still need to upgrade!

Once Microsoft officially ends support for XP on Patch Tuesday in April (the…


Sophos and Check Point Partner to Protect Corporate Networks from Non-Compliant Mobile Devices

The partnership means users of Sophos Mobile Control 4.0 and Check Point Mobile…


GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy!

What’s a CSR? If you have ordered an SSL Certificate before, you were…


Dirty Dozen spam sending nations - find where you finished in our Q3 SPAMPIONSHIP chart

Spammers versus spam senders There's a big difference, because spammers…


Sophos Launches Complete MSP Security

Sophos Complete MSP Security is the first MSP-focused solution to offer…


Focus on Security with Jacarta's products

One area that is becoming increasingly popular with many users is Security. The…


Sophos Security Threat Report, Highlights shifting crime tactics and what to expect in 2014

“While many security experts are aware of the high level trends, few have…


New Apple iPhone 5s to feature "Touch ID" fingerprint authentication

The authentication system, based on a new material for the home button and a…


Planes can be hacked remotely with Android app, researcher claims

  to hack a plane. That includes potentially gaining information about an…


How to protect your virtual machines from malware, without hurting performance

In particular, the overhead of running multiple concurrent antivirus scanners…


5 reasons to make your next firewall a Sophos firewall

There are many reasons why you should consider Sophos for your next firewall…


Microsoft predicts bleak future for XP users after patches run out

One risk is that attackers will have the advantage over defenders who choose to…


UTM and next-gen firewalls: What’s the difference? (Infographic)

As we explain below, next-generation firewalls are typically defined as…


GlobalSign. Important Security Advisory Blog: Heartbleed Bug

This data can include sensitive material such as the server's private key, but…


Sophos Maintains Leadership Position in the 2013 Magic Quadrant for Mobile Data Protection

According to Gartner, Leaders are at the forefront of making and selling mobile…


1 in 30 have been hit by CryptoLocker and 40% pay the ransom, says study!

The survey was organised by the University of Kent's Interdisciplinary Research…


Sophos announced Sophos Mobile Control 4.0

The new Sophos solution helps IT professionals confidently implement BYOD…


10 tips for securing your smartphone

1. Always secure your smartphone with a password One of the most basic security…


NSS and SOPHOS @ Infocom Security 2013

information security to the status of the most crucial factor that should be…


Array Networks Recognized as Innovator in the ADC market

Info-Tech examined ADC vendors that are solving the problems of server downtime…


New interSeptor and interSeptor Pro firmware now available

The firmware can be downloaded now from our Downloads page.


AV-Test results show Sophos beats Kaspersky, Trend, McAfee and Symantec in stopping Mac malware

For the first time, AV-Test has released test results comparing malware…