Sophos UTM version 9.1 was made Generally Available to all customers last week and thousands of customers have already successfully upgraded and begun to benefit from all the new features.
App Security Wins Move at Snail’s Pace
Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…
Microsoft Releases IE8 Fix-It Patch
Are you using Internet Explorer 8? If so, you need to read on
Finding Similarities and Differences at DEX Level
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One the samples was targeting a Japanese audience, while the other sample was for Korean end-users
M2M Attracts Enterprises, Risks and All
Machine-to-machine (M2M) communications applications are working their way beyond traditional utility, traffic control and telemedicine industries, as enterprises search for ways it can benefit their businesses despite some real risks.
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
Tragic Spam
Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
W32/Kryptik.AX!tr – A Masterful FTP Trojan
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code.
Bitcoin and the ZeroAccess Botnet
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.
Analyst Commentary – Security Appliance Growth Continues
There was a flurry of news articles out recently highlighting some interesting data points from IDC. In particular, according to IDC, worldwide factory revenue from security appliances was up 7.2% year on year to $2.3 billion, as unit shipments increased 5.2% to 538,428. Granted, Q4 is generally the strongest quarter in the tech industry, so it should be no surprise to most to see a strong finish to the year