Threat Analyses
sophos.com | Apr 21st 2011We constantly monitor threats from all sources. But we don't stop there. Our research teams go deeper to find the details of threats and where they come from. Our threat analysis pages can help you discover what you need to know to protect your system.
Viruses and spyware
You'll find all you need to know about viruses and spyware here. We've got details on known and new threats, plus our analysis and what it means for you. And we'll help remove threats as soon as you find them.
Suspicious behavior and files
Our threat researchers find and analyze every bit of information on files that are either executing and behaving questionably, or that look questionable before they execute. You can see what we've discovered about suspicious files. And that can help you decide which files to trust.
Controlled applications
We'll help make your security decisions easier with our controlled applications information. Our teams analyze the potential threats from applications like IM, games and VoIP. You can use that data to decide what to allow or block from your network.
Controlled devices
Get all the information you need to keep a handle on devices on your network. We've got full details and analysis on things like USB keys and Bluetooth interfaces. Our data can help you choose your ideal security policies.
Adware and PUAs
We've got all you need to know on adware and potentially unwanted applications (PUAs). You'll find details and help on getting rid of unwanted programs and freeing up your network.
Hoaxes
We gather all the information we can on viruses and hoaxes, which are fake virus reports that spread by email. Our threat analysts update this page with new hoaxes that emerge. We'll help you stay ahead of virus hoaxes to protect your network and inboxes.
Download a free security scan
Find what your antivirus missed
Original Page: http://www.sophos.com/en-us/threat-center/threat-analyses.aspx
Shared from Read It Later
No comments:
Post a Comment