Search Results for: sophos
-
News
The Education Sector Was the Hardest Hit by Ransomware in 2020
The education sector was the hardest hit by ransomware in 2020 with 44% of organizations hit (compared to 37% across…
Read More » -
CYBER SECURITY
[Column] Peter Mackenzie: Top 10 security misconceptions
The Sophos Rapid Response team has compiled a list of the most commonly held security misconceptions they’ve encountered in the last…
Read More » -
News
[Column] Chester Wisniewski: Beg bounty hunting – why do people do it, and how?
I recently wrote a Sophos News article on the whole phenomenon of “beg bounties” and invited organizations that had been…
Read More » -
News
The Realities of AI in Cybersecurity: Catastrophic Forgetting
There is a lot of hype about the use of artificial intelligence (AI) in cybersecurity. The truth is that the…
Read More » -
News
DearCry, prototype ransomware, takes advantage of Microsoft Exchange Server vulnerabilities
Following the reporting of the Microsoft Exchange vulnerabilities and the out-of-band release of security patches on March 2nd 2021, security researchers have…
Read More » -
CYBER SECURITY
Safer Internet Day – why not up your game?
Usually, when Safer Internet Day comes around, the cybersecurity situation hasn’t changed much from the year before, so it doesn’t…
Read More » -
CYBER SECURITY
Black Friday – stay safe before, during and after peak retail season
It’s three weeks until US Thanksgiving, which happens on the fourth Thursday of November. As readers around the world now…
Read More » -
News
Smishing attack tells you “mobile payment problem” – don’t fall for it!
As we’ve warned before, phishing via SMS, or smishing for short, is still popular with cybercriminals. Sure, old-fashioned text messages have fallen out…
Read More » -
News
Paul Ducklin: Securing you IoT devices at home
Paul Ducklin, Principal Research Scientist at Sophos, offers some tips for keeping IoT devices and other connected computers secure at…
Read More » -
CLOUD
[Column] Francis Wainaina: Africa, Kenya and the Cloud – The Numbers You Need to Know
As a unified online platform for communication and collaboration, the cloud is now widely considered to be one of the…
Read More » -
CYBER SECURITY
SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!
Aren’t SMSes dead? Aren’t they just plain old text anyway? Surely they’re of no interest to cybercriminals any more? Well,…
Read More » -
CYBER SECURITY
Delete these 23 Dangerous Apps from your Android Device
It’s become a norm that, now and then, new security reports emerge advising against some number of apps. The issue…
Read More » -
COLUMNS
Peter Mackenzie: Five signs you’re about to be attacked
Whenever we work with ransomware victims, we spend some time looking back through our telemetry records that span the previous…
Read More » -
COLUMNS
[Column] Chester Wisniewski: Why ransomware is just not a passing fad
We are only 5 weeks away from the anniversary of the birth of modern ransomware, Sept. 5, 2013. I mark…
Read More » -
CYBER SECURITY
[Column] Time to rethink your approach towards password change
Until a few years ago, everyone received advice to change passwords on a regular and frequent basis, just because it…
Read More » -
CYBER SECURITY
Watch out! Scummy scammers target home deliveries
If you’re sitting at home right now, sheltering from the coronavirus pandemic – and there’s a good chance you are…
Read More » -
COLUMNS
Are you working at home due to coronavirus? Secure yourself with these few tips
Many if not most organisations have already crossed the “working from home”, or at least the “working while on the…
Read More » -
CYBER SECURITY
How most prevalent and persistent ransomware families attack victims
Sophos has published How Ransomware Attacks, a playbook for defenders that explains how ransomware variants attack and impact victims. The playbook…
Read More » -
Apps
Google Pulls down Android Apps overcharging users for basic features
Google Playstore – Android’s official application store has been up for bashing, especially on the security-related side of it. Well,…
Read More » -
CLOUD
[Column] Seven Best Practices for Securing the Public Cloud
The simplicity and cost-effectiveness of the public cloud have led more and more organizations to take advantage of Amazon Web…
Read More » -
CYBER SECURITY
Matrix Deconstructed: The trend for targeted ransomware continues
Endpoint security leader Sophos has released a new report about a new ransomware family called Matrix. The malware has been operating…
Read More » -
CYBER SECURITY
‘Collection #1’ data breach leaks more than 700M email addresses
In what has been described as one of the largest data breach in history, the Troy Hunt owned Have I…
Read More » -
CYBER SECURITY
Sopho adds Lateral Movement Protection to XG Firewall to prevents threats from spreading
Sophos has now included lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised…
Read More » -
CYBER SECURITY
IT Leadership: Preventing your network from becoming a Botnet
By Harish Chib, vice president, Middle East & Africa, Sophos Botnets are large volumes of distributed networked computers and devices that…
Read More » -
CYBER SECURITY
SamSam: The new ransomware that has raised ransom demands of almost $6 million
Network and endpoint security leader Sophos has uncovered a new ransomware which it claims has raised vastly more ransom demands…
Read More » -
CYBER SECURITY
Something Phishy: How to Identify and Avoid Phishing Scams
By Harish Chib, VP MEA Sophos. Phishing is one of the most common attack vectors for hackers who exploit end-user behavior…
Read More » -
News
Be cautious of cyber attacks this Black Friday
It is easy to feel overwhelmed by numerous Black Friday deals seemingly to fall out of the sky. They might…
Read More » -
CYBER SECURITY
Opinion: Preparation is key when defending against DDoS attacks
By Bryan Hamman, Arbor Networks territory manager for Sub-Saharan Africa If you are well prepared with your security systems –…
Read More »