Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/2/2010
05:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Free Consumer Mac AV From Sophos

Sophos Anti-Virus Home Edition for Mac provides automatic on-access detection that runs in the background

IT security and data protection firm Sophos has today announced the availability of a free Mac anti-virus product for consumers, available to download at no charge, with no time limit, and requiring no registration. Sophos Anti-Virus Home Edition for Mac is available free to Mac home users worldwide, protecting them against all known malware, including both Mac and Windows-specific threats including Trojan horses, viruses, worms and spyware. Visit http://sophos.com/freemacav to learn more and download. Based on Sophos's flagship security software, currently protecting over 100 million business users worldwide, Sophos Anti-Virus Home Edition for Mac has been released in response to growing concern about Mac malware. A recent Sophos investigation into attitudes about Mac security surveyed 640 people, which revealed that 95% expect Macs to be increasingly targeted by malware in the future*. Although malware is more common on Windows than it is on Mac, Apple's growing market share makes Mac an increasingly attractive platform for malware authors and hackers to target. "While most businesses recognise the importance of protecting their Mac computers from malware threats, most home users do not," said Chris Kraft, product management vice president at Sophos. "By offering free industrial-strength security to home users, we aim to protect Mac users against today's and tomorrow's Mac threats. Everyone knows that Macs are beautiful computers - Sophos wants to lend a hand to keep them that way." Past threats to Mac users have included – Websites that pose as legitimate-looking software vendors sites, but whose downloads are really Mac malicious code.

– Malware disguised as pirated software available for download from P2P file-sharing networks.

– Sexy online video links that urge you to install a plug-in to view the content, but really infect you with a Mac Trojan horse.

– Popular Twitter accounts, such as that belonging to former Apple evangelist Guy Kawasaki, who have tweeted out links to websites designed to infect Mac computers.

– Windows viruses, which come in via email, web or USB drive, either being passed on to Windows-using friends or colleagues, or infecting virtual installations of Windows installed on a Mac. "Most people don't know that Apple acknowledged the malware problem by integrating rudimentary protection against a handful of Mac Trojans in Snow Leopard. But 95% of those surveyed are convinced that more is on the way," explained Graham Cluley, senior technology consultant at Sophos. "Wise Mac users will secure their computers now, outwitting malware authors – if we make their jobs of infecting Macs damn difficult, they will go elsewhere to make a quick buck." Sophos Anti-Virus Home Edition provides automatic on-access detection that runs in the background, which means Mac users don’t need to run any manual scans to be protected against the millions of viruses, worms, spyware and Trojans in existence. Furthermore, strong disinfection capabilities make it easy to clean-up an infection should malware already be in place. Sophos Anti-Virus Home Edition for Mac is backed by SophosLabs, the global network of highly skilled researchers and analysts at Sophos, protecting businesses from known and emerging malware.

Sophos has also launched a dedicated Mac support forum to allow users to interact with others in their community and get any questions answered about the product or Mac security. : http://openforum.sophos.com/MacAv

To learn more about product features and download, visit http://sophos.com/freemacav Visit http://nakedsecurity.sophos.com, Sophos’s new security blog, for more information.

Technical Specifications: - Mac with Intel or PowerPC processor - 256 MB of memory - 150 MB of available disk space - Mac with OSX 10.4 (Tiger), 10.5 (Leopard) or 10.6 (Snow Leopard) - Supports All Apple Mac hardware including iMac, MacBook, MacBook Pro and the new MacBook Air

* Sophos survey of 645 people, Sept-Oct 2010

About Sophos More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing security and data protection solutions that are simple to manage, deploy and use and that deliver the industry's lowest total cost of ownership. Sophos offers award-winning encryption, endpoint security, web, email, and network access control solutions backed by SophosLabs - a global network of threat intelligence centres. With more than two decades of experience, Sophos is regarded as a leader in security and data protection by top analyst firms and has received many industry awards. Sophos is headquartered in Oxford, UK and Boston, US. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mutooshaml
50%
50%
mutooshaml,
User Rank: Apprentice
4/2/2018 | 3:10:14 AM
mobile application is secure or not
mobile application is secure because there are so many change in these activities.mobile app are very useful for people to easily installed in phone.most app are not secure they are hacked your database scurity.we are provided yahoo mail customer support help your mobile secure with hacker and virus.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13100
PUBLISHED: 2020-10-26
Arista’s CloudVision eXchange (CVX) server before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (crash and restart) in the ControllerOob agent via a malformed control-plane packet.
CVE-2020-25470
PUBLISHED: 2020-10-26
AntSword 2.1.8.1 contains a cross-site scripting (XSS) vulnerability in the View Site funtion. When viewing an added site, an XSS payload can be injected in cookies view which can lead to remote code execution.
CVE-2020-7751
PUBLISHED: 2020-10-26
This affects all versions of package pathval.
CVE-2020-27678
PUBLISHED: 2020-10-26
An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.
CVE-2020-27388
PUBLISHED: 2020-10-23
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.