Microsoft Office DDE zero-day: are you protected?

Credit to Author: Bill Brenner| Date: Fri, 13 Oct 2017 20:15:34 +0000

Microsoft Office DDE zero-day enables attacks without using macros.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=43455&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/lPxny4w09gk” height=”1″ width=”1″ alt=””/>

Read more

Free and cheap ways to learn about IT security

Credit to Author: Eric Geier| Date: Fri, 02 Jun 2017 03:00:00 -0700

Whether you’re an IT student or have been in the field for many years, the learning never stops, especially in regards to security. Hackers are discovering vulnerabilities in our software and systems 24/7. They’ll always find new ways to steal data, infect computers and wreak havoc in the digital world.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Migliora le prestazioni e la stabilità del tuo XG Firewall

Credit to Author: Sophos Italia| Date: Wed, 07 Jun 2017 05:45:42 +0000

Durante l’anno abbiamo implementato centinaia di miglioramenti all’XG Firewall tramite i rilasci di manutenzione. Ognuna di queste release include miglioramenti alla performance, alla stabilità e al funzionamento del vostro XG Firewall. Esse includono correzioni di bug, una maggiore efficienza e una migliore interfaccia utente. Negli ultimi aggiornamenti abbiamo migliorato il funzionamento di numerose aree chiave: [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=37185&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QLHRyvp9n44″ height=”1″ width=”1″ alt=””/>

Read more

IDG Contributor Network: Winning the war on ransomware

Credit to Author: Rob Cheng| Date: Mon, 22 May 2017 11:00:00 -0700

Back in the ‘70s, the United States suffered a severe oil shortage.

Lines at the gas station filled city blocks. Thieves siphoned gasoline not to save money but time. In response, the federal government created a measurement, miles per gallon. Since then, MPG has become a factor in many car purchase decisions. Today, fuel efficiency has improved threefold, and we have hybrid and electric cars.

We are facing another crisis that threatens our way of life — ransomware. Cybercriminals hold hostage individual, public sector and enterprise data with remarkable ease and frequency. Although paying ransoms may solve a short-term problem, it almost guarantees that attacks will continue creating a larger threat to our digital society.

To read this article in full or to leave a comment, please click here

Read more

(Insider Story)

Read more

L’UTM 9.5 è in arrivo – e ci piacerebbe che ci aiutaste a tirarla a lucido

Credit to Author: Sophos Italia| Date: Fri, 21 Apr 2017 05:33:10 +0000

L’UTM 9.5 è in arrivo – e ci piacerebbe che ci aiutaste a tirarla a lucido L’UTM 9.5, e le numerose nuove funzionalità che ci avevate richiesto, è proprio dietro l’angolo e vorremmo invitarvi ad unirvi al beta test del rilascio. Questa versione si basa sulla protezione e sulle nostre prestazioni leader del settore, con [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=2272&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/D945nkiYrYA” height=”1″ width=”1″ alt=””/>

Read more

Face it: Enterprise cyberattacks are going to happen

Credit to Author: Matt Hamblen| Date: Wed, 03 May 2017 11:00:00 -0700

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won’t get days or weeks to root around and grab sensitive corporate data.

This enterprise focus on rapid detection and response to various attacks on networks and computers doesn’t replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.

To read this article in full or to leave a comment, please click here

Read more

How seven mesh routers deal with Wi-Fi Protected Setup (WPS)

Credit to Author: Michael Horowitz| Date: Fri, 28 Apr 2017 11:20:00 -0700

The recent wave of new mesh router systems has brought with it changes besides the obvious increase in Wi-Fi range. For example, these mesh routers are more likely to insist on WPA2-AES encryption, as many have dropped support for the less secure WEP and WPA options. Not all of them, but many.

Here I take a look at another insecure router technology, WPS (Wi-Fi protected setup) and how these new mesh routers deal with it. 

WPS is an alternate way of gaining access to a Wi-Fi network that does away with having to know the SSID (network name) and password. Much of what you read about WPS is incomplete, as it supports at least four different modes of operation.

To read this article in full or to leave a comment, please click here

Read more