Source: sophos.com

Reignite your firewall

Reignite your firewall

Demystifying deep learning: how Sophos builds machine learning models

Demystifying deep learning: how Sophos builds machine learning models

Why NIST’s Bill Burr shouldn’t regret his 2003 password advice

Why NIST’s Bill Burr shouldn’t regret his 2003 password advice

Fake hot-babe spears businessmen on LinkedIn

Fake hot-babe spears businessmen on LinkedIn

Anatomy of a privacy fail – when “Dark Data” gives away your identity

Anatomy of a privacy fail – when “Dark Data” gives away your identity

Should governments keep vulnerabilities secret?

Should governments keep vulnerabilities secret?

Multiple vulnerabilities found in radiation monitoring gateways

Multiple vulnerabilities found in radiation monitoring gateways

Dark Web criminals caught after reusing passwords

Dark Web criminals caught after reusing passwords

Emotet malware creating randomly named exe files

Emotet malware creating randomly named exe files

For better machine-based malware analysis, add a slice of LIME

For better machine-based malware analysis, add a slice of LIME

Facebook has got your number – even if it’s not your number

Facebook has got your number – even if it’s not your number

Sophos UTM and Kerberos SNAME security feature bypass vulnerability CVE-2017-8495

Sophos UTM and Kerberos SNAME security feature bypass vulnerability CVE-2017-8495

BUPA breach – why names and addresses matter

BUPA breach – why names and addresses matter

Your gadget could save your life: smart device phones police

Your gadget could save your life: smart device phones police

Update your Android now – many holes fixed including ‘BroadPwn’ Wi-Fi bug

Update your Android now – many holes fixed including ‘BroadPwn’ Wi-Fi bug

Bad things happen to good people – but you can help stop that

Bad things happen to good people – but you can help stop that