Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


older | 1 | .... | 180 | 181 | (Page 182) | 183 | 184 | .... | 254 | newer

    0 0

    300 million reasons why you should improve the health of your computers in 2016 by using IPS.

    続きを読む

    0 0

    アフィリエイトプログラムを通じた稼ぎを狙って、3 つのバリエーションで偽の Instagram プロフィールが出回っています。

    続きを読む

    0 0

    Android.Bankosy gets updated to steal passwords sent through voice calls generated by 2FA systems.

    続きを読む

    0 0

    This month the vendor is releasing nine bulletins, six of which are rated Critical.

    続きを読む

    0 0

    Less than two years ago, we first launched our signature Cyber Career Connection (SC3) initiative. The cybersecurity industry is facing a workforce crisis – the global shortage of cybersecurity professionals is expected to reach a shocking 1.5 million by 2020. We saw an opportunity to address this issue impacting our industry while also undertaking another key problem – the lack of women and people of color in cybersecurity roles. SC3, in collaboration with our partners NPower and Year Up, is designed to train and certify underserved youth for careers in cybersecurity. The program combines key classroom-based training, meaningful hands-on internship experience and support for job placement.  Individuals who had never considered careers in cybersecurity had the opportunity to earn Network+, Security+ and Linux+ certifications. Since its inception, SC3 students have successfully launched their cybersecurity careers with internships and full-time employment at major companies, including CBS Interactive, Conde Nast, eBay, GAP, KPMG, SAP and more. Of the graduates, 96 percent are black or Hispanic, and 38 percent are female, fueling a more diverse pipeline. 

    In 2015, we congratulated our first graduating class, some of which were hired here at Symantec, the program opened its doors to serve U.S. veterans, and we went international by expanding the program to India! As we ring in 2016, we’re excited to announce that we’ve partnered with two more wonderful organizations to continue SC3’s success:

    StrideCenter.png

    The Stride Center:  The Stride Center seeks to empower low income individuals facing barriers to employment by achieving economic self-sufficiency through job skills training, credentials, career coaching, work experience, and job placement assistance. First started in 1999, the center now has five locations serving low-income areas in the San Francisco Bay Area and has trained close to 3000 adults since its inception. The Bay Area may be home to Silicon Valley, the center of the technology industry, yet the Bay Area is ranked 14th in income inequality out of the largest 150 metro areas in the United States, particularly impacting people of color. Stride’s work addresses this issue as well as the shortage of skilled ICT workers and lack of diversity in Tech.

    The Stride Center will train and certify a new wave of SC3 students at their Oakland, CA location. Historically, the Stride Center’s students have had little or no digital skills, so prior to enrollment in the SC3 program, they will first have to undergo an intensive digital literacy program. Thirty students – two classes of young adults or veterans – will be enrolled in the SC3 program to gain two industry recognized certifications, Network+ and Security+, as well as career coaching, industry mentors, internship opportunities, and job placement.

    PerScholas_0.png 

    Per Scholas: Per Scholas’ mission is to break the cycle of poverty by providing technology education, access, training and job placement for people in underserved communities. They have six training centers across the U.S and currently provide full-time, tuition free IT-Ready trainings that lead to the CompTIA A+ professional certification. Since 1998, Per Scholas has provided employer-driven IT training to more than 5,000 individuals. One of their core goals is to reduce unemployment among veterans, including women veterans. Currently, there are 1.5 million veterans looking for jobs and 2 million who are underemployed.

    With this goal in mind, Symantec has partnered with Per Scholas to pilot cybersecurity training specifically for military veterans with emphasis on women veterans in Alexandria and Herndon, Virginia. The program will focus on 50 veterans who will first participate in Per Scholas A+ certification training and job placement program. After completion of the training and 6-months of hands-on work experience, they will enroll in a 16-week cybersecurity training to receive certifications in Network+ and Security+.

    Symantec Employee Involvement

    These new partnerships with the Stride Center and Per Scholas will create many meaningful, skills-based volunteering opportunities for Symantec employees from mock interviews, mentorship opportunities, and classroom speaking engagements. Our employees’ professional knowledge can enhance the students’ training and career development and we encourage our employees to get involved.

    Our Vision

    SC3 is part of Symantec’s broader goal to excite, engage and educate 1 million students in science, technology, engineering and mathematics (STEM) education by 2020. Partnering with organizations such as the Stride Center and Per Scholas helps us raise awareness within minority communities of the many long-term career opportunities in cybersecurity. We look forward to working with these two non-profit partners to scale this program even further to close the cybersecurity skills gap.


    0 0

    Twitter カードのスタイル: 
    summary

    Happy New Year 2016!

    What a year 2015 has been! We want to take a moment to thank you for being our valued partner—we’ve been partners with some of you for more than thirty years, and that means everything to us. 

    We are very excited for the start of 2016. With our singular focus on cybersecurity, we know our solutions in combination with your expertise will deliver powerful security solutions to our mutual customers, and will lead to a more secure 2016.

    The worldwide cybersecurity market continues it’s fast growth at almost 12% in 2016 (estimated to reach $30b worldwide). It will take strong partnerships and market leadership to capitalize on this growth. Only Symantec has both.

    At Partner Engage last October, we shared our company and go-to-market strategies with you.  We showcased some our latest innovations that leverage our Global Intelligence Network (GIN)—something no other security company in the world has. Our focus in 2016 is on:

    • Threat Protection with the launch of our new Advanced Threat Protection (ATP) solution that uncovers, prioritizes, and remediates, leveraging your customer’s existing installations of Symantec Endpoint Protection and Symantec Email Security.cloud
    • Information Protection with the new release of Data Loss Protection (DLP) that allows our customers to take fuller advantage of their cloud with additional visibility and control.
    • Cyber Security Services (CSS) with the recent release of Security Awareness and Phishing Readiness to increasingly help your customers address their growing security needs and improve their overall cyber security resiliency.

    We want to invest more with you to grow your business and security practices. We have clear direction moving forward and will continue to ask for your feedback throughout 2016.

    As we look back at 2015, it’s been an exciting journey. We are through the hardest part of our transformation and now are focused on flawless execution to drive mutual success and new business. With your partnership and focus, we begin the New Year with unbelievable strength.

    We look forward to driving our joint business with you in 2016! Let us know how we can support you by posting any comments below.

    Best regards,

    John Thompson and Stephen Thomas


    0 0

    2016 年を迎えるにあたり、IPS を使ってコンピュータの安全性向上を図るべき理由を、さまざまな観点からお伝えします。

    続きを読む

    0 0

    Android.Bankosy がアップデートされ、2 段階認証システムで生成されたパスワードを音声通話から盗み出せるようになっています。

    続きを読む

    0 0

    今月は、9 個のセキュリティ情報がリリースされており、そのうち 6 件が「緊急」レベルです。

    続きを読む

    0 0

    すべての大手パブリック認証局(CA)と同じようにシマンテックでも、特定のパブリックルート証明書を定期的に評価し、利用を続けるか、ブラウザ以外の用途に転用するかを判定しています。後者の場合には、Web サイトを保護するために、主要なブラウザプロバイダや OS レベルのトラストストアプロバイダに、削除するか、少なくともルートを「信頼の停止(Untrust)」するよう正式に依頼しています。

    PCA3-G1 ルート証明書が有効期限の終わりに近づいていることを受け、シマンテックは過去数年をかけて、お客様との間で準備を進めてきました。去る 11 月には、いくつかのブラウザがまだこのルート証明書を使っている現状を確認し、PCA3-G1 ルート証明書を削除するか「信頼の停止(Untrust)」するよう、改めて呼びかけました。このルート証明書を削除または信頼の停止をしても、インターネット環境、特にブラウザユーザーに対しては何の害も、また不当なリスクもないよう、シマンテックは万全を期しています。

    代表的なブラウザについては、PCA3-G1 ルート証明書は無用になりますが、企業顧客のなかには、まだこれを利用しているお客様も少なくありません。企業ネットワークの内部で使われているレガシーソフトウェアや機器のために、証明書を要求してきたためです。そうしたニーズに応えるために、シマンテックは「プライベート SSL/TLS」ソリューションの一部として利用できるように、このルート証明書を転用します。シマンテックの記録と公開サイトのスキャンの結果、公開サイトでの利用についてはお客様すべてが移行済みであることが確認されており、PCA3-G1 ルート証明書を削除しても、ブラウザユーザーに対しては何のリスクもないと判断できるテスト結果が出ています。

    パブリック認証局の間では最近、ルート証明書の信頼の停止をめぐって混乱がありました。そのことから、もっと話し合いが必要であるとシマンテックは痛感しています。今後は、この件について定期的に投稿する予定です。これを機に、業界で広く議論が交わされ、Web サイトのセキュリティに関心をもつ関係者すべての利益となるようなアイデアを、全体で共有できるよう願っています。


    0 0
  • 01/12/16--23:23: 删除 PCA3-G1 根证书
  • 与所有的大型证书授权提供商一样,在赛门铁克公司,我们会针对某些公共根证书进行常规评估,以确定其是否应被继续投入使用或重新定义为面向非浏览器的应用。如果评估结果显示该证书已无法继续投入使用,为保障网站安全,我们会正式向主流浏览器及 OS 信任储存程序发出删除或“不信任”该根证书的要求。

    过去的几年我们已经与客户携手为 PCA3-G1 根证书即将寿终正寝做好了应对准备。11 月,我们继续跟进了数个仍在使用 PCA3-G1 根证书的浏览器,并告知现在是删除或“不信任”该根证书的时候了。我们竭力确保任何根证书的删除或“不信任”措施都不会对网络生态系统和浏览器用户造成损害或不必要的风险。

    该根证书在主流浏览器上已经失效,但仍有大量企业客户对其具有依赖性。为满足此类客户的需求,针对企业客户为公司网络遗留软件、遗留设备请求证书的情况,我们会在私人传输层安全(TLS)供应服务中重新使用 PCA3-G1 根证书。我们的记录和公开调查表明,所有的客户都已不再将该根证书用于任何公共使用用途,测试结果也让我们确信该根证书的删除不会给浏览器用户带来任何风险。

    近日,证书授权提供商(CA)就非信任根证书展开的讨论让我们认识到,需要更多的对话才能够让问题得到妥善处理。未来您将看到我们定期发布的博文。希望我们这一举措能够引起开放的行业讨论,只有这样我们才能共享不同的理念,所有网络安全利益相关者都可从中获益。


    0 0
  • 01/12/16--23:25: 移除根憑證 PCA3-G1
  • 賽門鐵克 (Symantec) 與所有的大型憑證授權機構一樣,會進行例行的評估,判斷特定的公用根憑證是否應繼續使用,還是該改用在其他非顯示於瀏覽器的用途。進行這類工作時,我們會向主要瀏覽器和作業系統的信任憑證庫供應商提出正式申請,或至少會「不信任」根憑證,以保護網站安全。

    近幾年來,我們已和客戶一同立下基礎,以面對根憑證 PCA3-G1 的使用壽命即將結束。11 月時,我們著手處理仍在使用該根憑證的數種瀏覽器,通知應移除或「不信任」PCA3-G1 根憑證。本公司作業仔細,以確保移除或「不信任」任何根憑證均不會對網際網路生態系統 (尤其瀏覽器使用者) 造成傷害或是帶來不當風險。

    雖然對於主要瀏覽器而言此根憑證已無用處,但確實有一些公司企業仍仰賴它。為了滿足這類需求,該根憑證將會重新使用於本公司的專用 TLS 產品,提供給已提出憑證要求的企業客戶,用於支援企業網路的舊式軟體和舊式裝置。本公司的記錄和公開掃描顯示,所有客戶皆已不再將該根憑證用於公開用途,此外測試成果也說明,移除這個根憑證不會對瀏覽器使用者造成風險。

    近來,憑證授權社群中對於解除根憑證信任出現了十分熱烈的討論,讓我們意識到有必要進行更多的溝通和宣傳。接下來,本公司會經常發表相關文章,希望藉此激起業界的開放式討論,共同分享想法,進而協助有意提高網站安全防護的人士。


    0 0

    Recent W32.Waledac botnet activity may have led to a 100 percent gain in the UPOT stock price.

    続きを読む

    0 0

    Learn how to protect your organization

    Forbes_ISTR_Post.jpg

    Every day, cybercriminals develop new ways to use malicious code (malware) to avoid detection while infecting networks, software and devices–from enterprise level to personal. Non-targeted attacks still make up the majority of malware, which increased by 26 percent in 2014. There were also more than 317 million new pieces of malware created in 2014, which means nearly one million new threats were released each day. The findings are part of last year’s Symantec Internet Security Threat Report Vol. 20.

    Symantec also found that some web-attack toolkits sold on the black market were designed to be used in the cloud. With so many potentially vulnerable environments, criminals are quick to exploit emerging platforms.

    What is the underground economy and what’s on sale on it? And more importantly, how do enterprises protect themselves?

    The Underground Economy

    “It’s the underground economy,” says Kevin Haley, Director, Symantec Security Technology and Response. “Everything you need already exists and can be purchased cheaply.  Because of the tools available to attackers there are few limits on how many threats they can create, attacks they can manage.”

    The underground cybercriminal economy continues to thrive. Criminals can now buy malware, attack kits and vulnerability information in this black market. While some of these markets have existed for quite a time, Symantec threat investigators found an increasing sophistication and professionalism in selling “Trojan” viruses, malware distribution and the selling of credit card information.

    What’s for Sale?

    In the underground marketplace, stolen data, credit cards, passports, compromised online accounts, custom malware, attack services and infrastructure, fraudulent vouchers, and much more are bought and sold. These examples aren’t the only goods and services on offer on underground marketplaces.

    Also for sale are:

    • Scans of real passports ($1 to $2), which can be used for identity theft purposes
    • Stolen gaming accounts ($10 to $15), which can yield valuable virtual items
    • Custom malware ($12 to $3,500), for example tools for stealing bitcoins by diverting payments to the attackers
    • 1,000 followers on social networks ($1 to $12)
    • Stolen cloud accounts ($5 to $8), which can be used for hosting a command-and-control (C&C) server
    • Sending spam to 1 million verified email addresses ($70 to $150)
    • Registered and activated Russian mobile phone SIM card ($100)

    Point of Sale Malware Attacks

    Cybercriminals are always hunting for credit card data. While there are ways to steal this information online, Point of Sales (POS) is a tempting target. This can include malware on retail check out registers or stealing the data from a customer database. An estimated 60 percent of purchases at retailers’ Point of Sale (POS) are paid for using a credit or debit card.

    Download our Attacks on Point of Sales Systems whitepaper for details on how POS attacks are carried out, and how to protect against them.

    How to Protect Your Organization

    While many organizations take steps to defend their networks, it is often the end-user that unwillingly lets malware into an enterprise. Education on good cybersecurity is vital and a company-wide concern. Be sure to incorporate security software that scans all inbound email communication, and blocks all unsolicited outbound communication.

    What follows are a few best practices for all employees to help deter malware:

    • Only open email/IM attachments from a trusted source and that are expected
    • If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session
    • Scan all files with an Internet security solution before transferring them to your system
    • Only transfer files from a well known source
    • Keep security patches up to date

    Actionable Cybersecurity Intelligence

    Threat intelligence is a vital component for any organization to understand the potential threats against their network. Symantec is uniquely positioned to share actionable cybersecurity intelligence on the rapidly evolving threat landscape.

    Stay proactive in the fight against malware to keep your enterprise protected.

    For more insights, read:

    Underground black market: Thriving trade in stolen data, malware, and attack services

    POS malware: Potent threat remains for retailers

    {Editor’s note: This piece was originally published 4/20/2015 and has been updated with new findings}


    0 0

    W32.Waledac ボットネットの最近の活動によって、UPOT の株価が 2 倍に高騰するという事態が引き起こされた可能性があります。

    続きを読む

    0 0

    Twitter カードのスタイル: 
    summary

    Informative Webinar: Feb 18, 2016

    Time: 10:00 AM (Pacific)

    With PHI, financial, and demographic information, healthcare is a data-rich environment and a popular target for attackers. Today’s cybercriminals are employing sophisticated tactics to trick unsuspecting victims or otherwise infiltrate healthcare organizations to gain this information. These advanced threats are highly stealthy and persistent, using novel techniques to hide themselves, sometimes for months, before even being detected.

    With the bad guys getting smarter and many healthcare organizations still lagging behind with the proper security measures, security leaders know it’s only a matter of time until they become the target. Watch this on-demand webinar as we discuss the shift in security that is being driven by the changing threat landscape and how organizations are implementing a multi-step approach to uncover, prioritize, and remediate threats facing their environments.

    During this webinar, you’ll learn:

    • What you can do to defend against advanced threats
    • Steps to reduce the number of incidents that require further investigation by knowing what to look at, when to look at them, and where to look
    • How Symantec can help you leverage your existing security investments to uncover advanced threats across your endpoints, networks, and email
    Speakers: 
     
    David S. Finn, CISA, CISM, CRISC
    Health IT Officer, Symantec Corporation 
     
    Janene Casella
    Senior Product Marketing Manager for Enterprise Security, Symantec Corporation
     

    Register Today at: http://bit.ly/connectblogsymantec0218

    webinar-healthcare-021816.png


    0 0

    Symantec Mobility Suite and In-house iOS Applications

    In most cases your application will not require these extended properties.  To keep this in the scope of Mobility, the in-house Work Hub, secure web and wrapped in-house applications do not require this extended property.


    0 0

    Users advised to patch vulnerability which affects many Linux-based operating systems.

    続きを読む

    0 0

    With one quarter to go in FY16, more than 600 people have earned their Take 5 jacket including many Symantec leaders who have embraced the challenge, organizing inspiring volunteer activities for their teams.

    At Symantec, our biggest strength is our people. Our mission—making the world’s information safer—is an important one. It calls upon every employee to use their unique talents and skills to help protect our customers, families, and communities. And it relies on a culture where leadership is the job of each employee and where passion, collaboration, and accountability shine.

    While there are many ways to cultivate leadership skills and strengthen teams within the traditional work environment, in recent weeks many Symantec leaders—including the Legal and Compliance leadership teams and the EMEA leadership team—have chosen to step outside the office and roll up their sleeves, Taking 5 to help both nonprofits and their own teams grow.

    “The benefits of volunteering are widespread, from discovering new talents to enhancing communication skills and problem-solving capabilities,” said Amy Cappellanti-Wolf, Senior Vice President, Chief Human Resources Officer at Symantec. “As we welcome in a new year, I’m thrilled to see so many of our leaders understand the value and importance of volunteerism and embrace the Take 5 challenge. A high bar has been set and I look forward to building upon the momentum and achieving a deeper level of volunteer involvement in 2016.”

    EMEA Leadership Team Creates Engaging Atmosphere for Local Youth

    In November as part of a team offsite, 20 members of the EMEA Executive Leadership Team, reporting to Kevin Isaac, Senior Vice President, Emerging Markets, joined together to provide a safer environment for the children that visit the Ufton Court Educational Trust, a residential center for youth—many of which are suffering from economic and social disadvantage.

    Throughout the day, the team cleared woodland areas and improved overgrown spaces that had become inaccessible across Ufton Court. Their work helped to transform the organization’s grounds, ensuring the spaces are safe and available for the children to explore and enjoy.

    “As a leadership team, part of our role is to build strong teams by ensuring trust and collaboration across the organization. Programs like Take 5 present an opportunity to get away from our day-to-day business duties and work together in a completely different environment to tackle unique challenges. I am so proud of our team and what we accomplished at Ufton Court. I whole-heartedly encourage all Symantec employees to get involved and give back to their communities,” said Kevin. 

    With the EMEA Leadership Team spread across many countries, this Take 5 activity served as an ideal way of bringing everyone together, strengthening bonds within the team, and benefiting others.

    EMEALeadership.jpeg

    Compliance Team Goes There With Care

    Last month, employees across the Legal Department, reporting to Carolyn Herzog and representing the Office of Ethics and Compliance Team, the Litigation Team, the Employment Team, and the Privacy Team, stepped up to volunteer with There With Care, a Bay Area nonprofit that provides essential services including food and clothing to children and families receiving care at Lucille Packard Children’s Hospital Stanford during critical phases of a medical crisis.

    The team donated healthy food and drink items and then packaged them up into “Easy Care Meal Bags” that can be consumed at a hospital bedside by patients’ parents and siblings. They also helped clean and organize the warehouse, stuff envelopes for the organization’s end of the year fundraising mailer, package up donor gift bags, as well as other tasks around the warehouse.

    In addition to providing a new perspective on the challenges that many community members are facing—including people who may be Symantec customers—the experience promoted trust and camaraderie by building a sense of community amongst the team as they worked toward a common goal. The project also served as a reminder about how little things added up, can make a big impact.

    “I love being at a company that is so supportive and encouraging. Take 5 and Dollars for Doers are wonderful. When we explained to the There With Care volunteer coordinator that they would not only get our group’s hands-on help because of the Take 5 challenge, but that they would also be receiving a check from Symantec for our time there, she responded ‘Wow, what a great company!’ I totally agree,” said Cameron Hoffman, Senior Corporate Counsel, Office of Ethics and Compliance.

    TWCIMG_1278.jpg

    Legal Leadership Team Gives Back at Second Harvest Food Bank

    The team that reports to Scott Taylor, EVP, General Counsel and Secretary, has limited opportunities to gather together in person, and when they do, topics are generally very serious in nature. As the holiday season approached, they felt a meaningful volunteer project would be a wonderful way to both make a difference and help strengthen their team. That’s why they made the decision to Take 5 as a group and honor Symantec’s long-term commitment to Second Harvest Food Bank

    Throughout the day, each of the eight leaders disassembled pallets of food, placing produce, frozen chicken, milk, and more into bags containing specific amounts of each item which were then handed out to Food Bank clients.

    “Everyone can relate to the desire to give back. The most impactful moment of the day was when a client came through who was familiar to all of us—one of the janitors who services our floor. That moment really drove home the need in Silicon Valley—people who are working incredibly hard and still need help to make ends meet,” said Scott.

    Following the team’s experience, Scott encourages all managers to create opportunities to bring their teams together and Take 5.

    FoodBankDSC_0056.jpeg

    One More Quarter to Take 5 in FY16

    As we kick off 2016, we’re extremely proud of the more than 600 employees who have achieved the Take 5 milestone and are proudly wearing their jackets. With their support, we are close to surpassing the total number of hours volunteered in FY15—and we still have one quarter to go.

    As Symantec leaders have demonstrated, Take 5 is something we can all do and we can do it together.

    For more information on Take 5, visit:

    Take 5 Challenge Accepted

    EMEA Legal Team Volunteers to “Take Five”!

    Volunteer of the Quarter – Online Safety in the Community

    Cutting Edge: Transforming Our Future with Innovation

    Take 5! Why Volunteering Matters

    Lora Phillips is Symantec's Director, Corporate Responsibility 


    0 0

    Linux ベースの多くのオペレーティングシステムに影響する脆弱性が存在します。早急にパッチを適用してください。

    続きを読む

older | 1 | .... | 180 | 181 | (Page 182) | 183 | 184 | .... | 254 | newer