< Personal
Find the right product
Infected already?
< Business
Learn more about Security Advisor (available in every bundle). >
< Pricing
Protect your personal devices and data
Protect your team’s devices and data
Step up your corporate endpoint security. Save up to 45%
< Partners
< Resources
The State of Malware 2023 Report
< Support
August 1, 2013 - Yesterday, analysts at SophosLabs looked at a new ZeroAccess variant using some new tricks to hide itself. Or should I say...
July 25, 2013 - Debuggers—a tool traditionally used to find errors (called “bugs”) in code—are also used by security experts. In the field of malware...
July 25, 2013 - Yesterday, Google unveiled the latest version of it’s renowned Android Operating System at an event in San Francisco. Labeled as a...
July 18, 2013 - A few weeks ago, we wrote about an Android master key flaw discovered by Bluebox Labs that allowed modification of APK...
July 9, 2013 - About a month ago, I wrote a blog post explaining how malware can use process memory to its advantage, changing dramatically...
July 8, 2013 - Tomorrow on Patch Tuesday, Microsoft will be issuing security updates that address multiple vulnerabilities across several of its products. This information...
July 4, 2013 - According to the firm’s CTO Jeff Forristal, the vulnerability allows a hacker to “modify APK code without breaking an application’s cryptographic signature,...
July 2, 2013 - Back in 2003 when Valve released its now well-known game distribution software called Steam, I wasn’t immediately sold on the idea....
June 26, 2013 - Gamer or not, you’ve likely heard about the next generation of video game consoles arriving later this year. However, you probably...
Contributors
Threat Center
Podcast
Glossary
Scams
Select your language