Category Archives: Endpoint Security Monitoring

Your voice assistant can hear things you can’t – such as a hacker

Source: Sophos Naked Security by Taylor Armerding Word from Apple, ahead of the big rollout of iPhone 8 and iOS11 on September 12, is that its voice assistant Siri is going to sound more like a person and less like a robot. Great for the user experience. But based on a report published just last week by a team of researchers… Read More »

Two-factor via your mobile phone – should you stop using it?

Source: Sophos Nacked Seruity Our friends over at The Register just documented yet another real-world example of a cybercrime known as SIM swapping. In its most up-front form, here’s the sort of thing that happens. A crook walks into a mobile phone shop, lets himself get talked into a top-of-the-range new mobile phone to replace the one he says he just… Read More »

New variant of Petya ransomware (also known as Petrwrap/PetyaWrap)

Source: Sophos Knowledge Base Overview Sophos is aware of a new ransomware variant being seen in multiple countries today. Our investigation shows that this attack both encrypts files and the Master Boot Record (MBR) and can spread rapidly using several techniques, including the “EternalBlue” exploit of a vulnerability in the Windows Server Message Block (SMB) service, which Windows… Read More »

Petya variants behind the global ransomware outbreak: here’s what we know so far

Source: Sophos Naked Security Editor’s note: Sophos customers can follow the technical updates in this Knowledge Base Article, which includes a list of the variants we’re detecting and blocking. This article will also be updated as new details emerge. SophosLabs has determined that new variants of Petya ransomware (also known as GoldenEye) are behind the massive online outbreak that spread across Europe, Russia,… Read More »

How to Backup your Android contacts (article 1)

Backup your Android – Why should you care One of the cloud hosted services we offer is enterprise cloud hosted backups which also allows for scheduled backups of mobile devices. Because we have chat enable on our web sites once in awhile we have someone asking questions about how to do something on their smart phone. Not exactly… Read More »