What is… cryptojacking?
Credit to Author: johnshier2013| Date: Tue, 31 Jul 2018 10:56:12 +0000
The dark side of cryptomining.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/8GqyojtuENw” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: johnshier2013| Date: Tue, 31 Jul 2018 10:56:12 +0000
The dark side of cryptomining.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/8GqyojtuENw” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Mon, 29 Jan 2018 18:15:29 +0000
SPF is short for Sender Policy Framework, and it can help you get rid of spam and phishing emails without even looking at the email content.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/AUJjnbhdDtM” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Fri, 07 Jul 2017 12:40:05 +0000
Whether you’re a family bakery in Estonia that keeps a list of local delivery addresses, or a multinational giant headquartered outside Europe that sells globally online, the EU’s General Data Protection Regulation almost certainly applies to you.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=40445&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vLW04Mz8lq4″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Tue, 27 Jun 2017 15:07:20 +0000
Welcome to our What is… series, where we turn technical jargon into plain English. Phishing is the word used when a cybercriminal sends you some sort of electronic message to trick you into doing something insecure. The “fishing” metaphor refers to the idea of getting you on the hook and then reeling you in. The […]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=40299&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jYAVEhKpqOI” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Fri, 07 Jul 2017 12:40:05 +0000
Whether you’re a family bakery in Estonia that keeps a list of local delivery addresses, or a multinational giant headquartered outside Europe that sells globally online, the EU’s General Data Protection Regulation almost certainly applies to you.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=40445&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vLW04Mz8lq4″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Tue, 27 Jun 2017 15:07:20 +0000
Welcome to our What is… series, where we turn technical jargon into plain English. Phishing is the word used when a cybercriminal sends you some sort of electronic message to trick you into doing something insecure. The “fishing” metaphor refers to the idea of getting you on the hook and then reeling you in. The […]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=40299&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jYAVEhKpqOI” height=”1″ width=”1″ alt=””/>
Read more