Tag

protection
Concern over the use of end-to-end encryption in the United States is preventing a bill aimed at preventing child sexual abuse from becoming law.  In a rare example of political unification during an election year, the “Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020,” or EARN IT Act, has attracted bipartisan support.  If passed, the...
Read More
Following the continued spread of coronavirus (COVID-19) across the globe, we’d like to reassure our customers and partners that our ability to protect them is uncompromised. All departments, including threat intelligence, protection, and response from SophosLabs, Managed Threat Response, and Global Support Services are operating as normal to provide 24×7 detection, protection, and technical support....
Read More
Google is unlikely to be moving UK users’ data to the US because of Brexit-related uncertainty and GDPR privacy rights will continue to be protected after any such move, according to a leading data protection lawyer. Reports this week claimed that the tech giant is looking to move user accounts to US datacenters following Brexit,...
Read More
The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen. Gillibrand, the US senator for New York, released the call to action last week. She announced draft legislation known as the Data Protection Act on Thursday 13 February, a day after explaining her...
Read More
Phase One of the US-China trade deal has finally been signed, with promises from Beijing that it will improve protection of IP and trade secrets and end forced tech transfers, although security experts will be skeptical. The majority of the headlines focused on the scrapping of some mooted tariffs on goods from China including mobile...
Read More
The Sophos Managed Threat Response (MTR) team and SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process. The attackers may be using this technique to circumvent endpoint protection, which often won’t run in Safe...
Read More
nationalcybersecurity.com

FREE
VIEW