Millie
your market intelligence analyst
Search Results
276 results
Your search is now limited to «Sophos» expert search.
Graham Cluley - Blog 06/04/2020 10:49
... SophosLabs got (quite reasonably) fed up with me blogging about this sort of nonsense, and so in April 2008 I was spun off into another blog imaginatively titled “Graham Cluley’s blog,” but still hosted on Sophos’s website.
More from Graham Cluley - Blog:
Attackers hacked and encrypted the computers of a contractor whose clients include the US military, government agencies and major military contractors.
More from Naked Security - SophosLabs blog:
Forbes 06/04/2020 07:43
This would mean, as explained by Sophos , that tech companies “either weaken their own encryption and endanger the privacy and security of all their users, or forego protections and potentially face liability in a wave of lawsuits.
More from Forbes:
CSOONLINE.com 06/03/2020 06:00
According to a 2016 Sophos white paper, “Code that CVE-2012-0158 exploits is housed within the Microsoft Windows Common Control Library.
More from CSOONLINE.com:
CoinTelegraph.Com 06/02/2020 16:41
Also, on May 22, a report from the UK-based cybersecurity firm Sophos released reports of a new method of human-operated ransomware attack launched by groups like REvil.
More from CoinTelegraph.Com:
BleepingComputer.com 05/28/2020 13:02
Michigan State University received a deadline to pay ransomware attackers under the threat that files stolen from the institution's network will be leaked to the public. [...]
More from BleepingComputer.com:
Security Awareness Blog 05/28/2020 10:00
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
More from Security Awareness Blog:
TechRadar 05/28/2020 05:54
SophosLabs' Mark Loman tells us about new attack technique which uses virtual machines to cloak ransomware.
More from TechRadar:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded

Analysts

Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications