SophosLabs is at the center of Sophos. It's the place where highly skilled experts in the field work round the clock to build protection from the latest threats. But what sort of people work there?
In our latest look at the people behind SophosLabs, we talk to Rowland Yu about his recommendations for those trying to get into computer security, his favorite book and how he's great at cooking chinese food.
In our latest delve into the minds behind SophosLabs, Peter Szabo talks about how the problem with malware isn't going away any time soon. He also reveals that he's a "digital hermit" and stays far far away from Facebook.
In the third post in our ‘Who is SophosLabs’ series, threat researcher James Wyke discusses the challenge of securing a mobile distributed workforce and his tips on how to stay safe online. We think he's joking about living in a bunker...
Popular SophosLabs writer Gabor Szappanos is back with more insights into the Tibetan-themed Advanced Persistent Threat (APT) scene.
This time, he looks at Smoaler, a new cousin of the PlugX family that starts off like what we've seen before, before branching off in new ways.
In the second post in our ‘Who is SophosLabs’ series, threat researcher Joanne Garvey reveals how she protects her information online, why she has no time for hobbies, and her fascination with chaos theory.
Did you miss anything in the past week?
Here's a recap of the hot 22 stories of the past seven days, so you can catch up quickly!
SophosLabs is at the centre of Sophos. It's where highly skilled analysts work round the clock to build protection from the latest threats. But what kind of people work there?
Malware targeting point-of-sale (POS) systems has been a major trend for the last six months. With easy pickings to be had from mom-and-pop shops, this pattern is only going to grow until people start fighting back with better system security, and ideally better payment card systems.
Virus Bulletin's Technical Director John Hawes takes a look....
Phishing is often regarded as old hat. From a technical perspective, it's a case of 'been there, done that'. Sometimes however, we come across attacks that are just a little bit more interesting (or at least different) from the norm.
Computer networks belonging to South Korean TV broadcasters and at least two major banks have been disrupted by what some have suggested was a malicious internet attack originating in North Korea.
It's that time of the week again - here's your roundup of everything we wrote in the last seven days.
A new technical paper from SophosLabs explores the history and technology of ransomware. From payment by SMS to public key encryption, ransomware has certainly evolved.
Here are 10 questions you should be asking your hosting provider about features and services that will help to keep your site secure, covering general security practices, application security and operation of the site itself.
For those interested in exploit kits and how they work, Gabor Szappanos has published the second (and concluding) part of his technical paper looking at the Blackhole kit.
Recommended reading for all those that want a little more detail as to how one of the most prolific and widely used crimeware kits actually works.