AV-Test e AV-Comparatives danno a Sophos Mobile Security il massimo dei voti

Credit to Author: Sophos Italia| Date: Mon, 01 Apr 2019 05:32:34 +0000

Siamo lieti di annunciare che Sophos Mobile Security ha ottenuto il massimo dei voti, rilevando tutti i campioni di malware con una precisione del 100% e senza falsi rilevamenti.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/hr71Ni_4HI4″ height=”1″ width=”1″ alt=””/>

Read more

AV-Test and AV-Comparatives give Sophos Mobile Security 100%

Credit to Author: Matt Cooke| Date: Fri, 22 Mar 2019 16:23:19 +0000

AV-Comparatives recently tested 250 Android security apps available on the Google Play Store against 2,000 of the most common Android threats from 2018. The test was designed to simulate real-world conditions and help Android users identify genuine, effective antivirus apps in a space where there&#8217;s no shortage of buggy, dubious or ineffective options. We were [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gVFR7jB-PAg” height=”1″ width=”1″ alt=””/>

Read more

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security

Credit to Author: Matt Cooke| Date: Sun, 24 Feb 2019 13:00:25 +0000

The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider threats, organizations can&#8217;t guarantee that everything on the inside of their network can be trusted. This is the principle of Zero Trust architecture. These days, organizations need to build controls immediately around the individual data assets, wherever they reside. Administrators [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/XjVD_dGJXyQ” height=”1″ width=”1″ alt=””/>

Read more

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Control

Credit to Author: Matt Cooke| Date: Sun, 24 Feb 2019 13:00:25 +0000

The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider threats, organizations can&#8217;t guarantee that everything on the inside of their network can be trusted. This is the principle of Zero Trust architecture. These days, organizations need to build controls immediately around the individual data assets, wherever they reside. Administrators [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KdKRyMB9Bck” height=”1″ width=”1″ alt=””/>

Read more

Fake Android banking apps target victims in India

Credit to Author: Pankaj Kohli| Date: Mon, 22 Oct 2018 03:30:48 +0000

Deceptive malware may have stolen thousands of Indian subcontinental bank customers’ account data or credit card numbers<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/VjeP8v3qZxE” height=”1″ width=”1″ alt=””/>

Read more