Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Spammers Leverage Binary Options Trading Hype

$
0
0

The latest trend in Russian language spam shows that spammers have started promoting Make Money Fast (MMF) schemes where users are told that money can be easily made with the use of binary options trading.

The sample observed by Symantec has the usual spam traits including a catchy subject, which highlights a large sum of money someone is making every month, to grab the attention of the recipient.

The spam is sent from mail.ru, the largest free email service in Russia, with the account name stating the age of the person linking it to the subject line. The following is a translation of the email header: 

Subject: $3700 a month – this retiree making more than you?
From: pensioner.vladimir@mail.ru

This is an effective trick, especially during the festive season when many peoples’ finances are stretched.

figure_0.jpg

Figure. Spam email highlights money-making pensioner

The body of the message advertises a Samara region pensioner’s high income made with the help of Binary Code. The recipient is asked to click on a hyperlink to get more information. The hyperlink leads to a hijacked domain, registered in 2008, that belongs to Web design company maxuz.com. The link is mainly used for redirection to another domain. The other domain, binarytraders.ru, was registered more recently in August 2013 and is likely to have been created specifically for this kind of spam. The domain’s main page lists advantages on why one should be involved in Binary Code trading along with a video with full instructions on how to get started. It also adds that binary options is currently the biggest money making tool available on the Internet.

Symantec has blocked this spam, but we wish to remind users to be alert this Christmas season and beware of Make Money Fast schemes.


Data Loss Prevention

$
0
0

 

Customers tend to ask me "how do I integrate data loss prevention into my enterprise"? Before any integration of a data loss solution, I give my customers an idea of where data loss can help them. Lets me discuss in an abstract case study.

One large oil company was concerned with losing their bid data to their competitors, and they wanted to understand how a data loss prevention solution can help guard their intellectual property. First to understand the threat to bid data we should start by understanding the underlying business processes that create that data (note: this is not all the processes involved, merely an abstract)

  1. The company performs a geological survey on land that is up for bid to see if it will produce oil, natural gas, etc. During this stage scientists are deployed to the land to do drilling and deploy equipment to view the layers of earth and rock below the surface of the land.
  2. Scientists take snap shots of this geological data which is now in the digital form, the information is unrefined and sits on hard drives ready to be brought back to the research labs. This data is terabytes of information.
  3. Scientists spend considerable amount of time refining the data in their labs, pin pointing which plots of land that company should focus oil producing efforts on. The refined data is small and can fit on a thumb drive.
  4. The bid data gets further analyzed by business analysts. They research prices, historical findings, potential yields, everything having to do with costs of the exploration, operations, and return on investment. This data is on shared drives, on laptops, in email, perhaps encrypted, perhaps not. Its size is small and portable.
  5. There are executive briefings about the potential bid strategy going forward, presentation on the front runners, competitor analysis, everything the executive team needs to execute on.

Lets review some of the stages in the above processes and where data loss prevention solutions can help.

In the second stage this information is valuable but its unrefined, other companies could reproduce these steps. The cost of losing this data is in the man hours and cost of the operation. The size of the storage also makes losing this data to theft or breach not likely. A operation to intercept this data whether in transit or on the network would not match the collection requirements of competitors or other interested parties. Therefore data loss prevention here would be mostly physical loss prevention such as guards, tracking information, etc.

In the third stage is where its important to highlight that the "value" of the data has now changed, the refined data is small, portable and has gone through the analysis by scientists which is the intellectual property of the company. Here is where data loss prevention should be applied to stymie a breach or loss of the refined data. Preventing the transfer of this data to unauthorized parts of the network, prevent emailing of this data, not allowing transfer of this data to a USB drive, and keeping the access to this data limited to those who need access. 

Now we see that data loss prevention solutions are effective when integrated into the stages of the business process where the value of the data its protecting changes, the threat to that data changes, and key business decisions can be impacted by the loss of this data.

In the fourth stage, the refined data receives business analysis that provides key decision making metrics for the company's exploration efforts. This analysis has now made the data even more valuable to corporate espionage or data loss. Here data loss prevention can protect the access, open, send, transmit or read capabilities to this data and further limit the group of people in the company who have a need to see or act on this information. This data is core bid data, its size is small, its stored in a variety of formats making those who have access to this data a target rich environment. 

Companies must understand the data flow of their intellectual property ecosystem and where their intellectual property must be protected in that data flow. Data loss prevention should be applied to key business process points, where the data becomes more valuable to the company rather than to areas that do not need to be addressed. Ultimately, data loss prevention is about integrating into business processes to protect sensitive data, such as with our abstract case study.

 

 

バイナリオプション取引の広告を利用したスパム

$
0
0

ロシア語のスパムに見られる最新の傾向として、スパマーは一攫千金話の手口を使い始めています。今回のサンプルでは、バイナリオプション取引で簡単にお金が儲かるという謳い文句が使われています。

シマンテックが確認したサンプルには、人目を引く件名を使うという典型的なスパムの特徴が見られます。毎月膨大な金額を稼いでいる人がいると煽って、スパムを受け取ったユーザーの注意を引きつけようとしています。

このスパムは、ロシアで最大の無料電子メールサービス mail.ru から送信されており、アカウント名は、件名に関連している人物の年齢を示唆しています。ヘッダーを翻訳すると次のような内容です。

件名: $3700 a month - this retiree making more than you?(毎月 3700 ドル。定年退職しているのに、あなたより稼いでるって?)
差出人: pensioner.vladimir @mail.ru

これは特に、多くの人々が散財しがちなホリデーシーズンには巧妙な手口です。

figure_0.jpg

図.年金生活者が大金を稼いでいると謳うスパムメールのサンプル

電子メールの本文には、サマラ地区の年金生活者がバイナリオプションを使って膨大な収入を得ているという広告が掲載され、詳しいことを知りたい場合はハイパーリンクをクリックするように書かれています。リンク先は実際には乗っ取られたドメインであり、2008 年に maxuz.com という Web デザイン会社によって登録されたものでした。このドメインは、主に他のドメインへのリダイレクトに使われています。binarytraders.ru という別のドメインはもっと新しく、2013 年 8 月に登録されたばかりです。この手のスパム専用に作成されたと思われます。このドメインのメインページには、バイナリオプション取引の魅力が書かれ、詳しい手順を説明するビデオも紹介されています。そのうえで、バイナリオプションは今インターネット上で利用できる最も有利な金儲けの手段であると付け加えています。

シマンテックはこのスパムを遮断していますが、ユーザーの皆さんもクリスマスシーズンにはいつも以上に警戒し、一攫千金話の手口にはくれぐれもご注意ください。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。

EASTERN EUROPE, CYBERCRIME – AND WHY CODE SIGNING IS VITAL

$
0
0

More and more software developers in the UK and US are looking to Eastern Europe to get their code written. After all, it can be done far more cheaply there, as well as offering an abundance of choice. Indeed, code writing ‘houses’ in Eastern Europe are proliferating in response to this demand – from one-man bands to sizeable operations. So any developer intent on keeping their costs down, and often along with the promise of a quick turnaround, has the perfect scenario for having their software code written there, right?

Not necessarily. Because cheap is not good if the code that’s written becomes compromised in any way. And when you, the developer, are possibly thousands of miles away from whoever is writing your code, you need to be even more sure of those into whose hands you are entrusting this process.

Certainly, there are many highly reputable enterprises in Eastern Europe that provide this service and deliver to the highest standards. But this is also a region where, not unlike other areas of the world, cybercrime has soared with the rapid growth of ecommerce and emergence of a more stable, faster Internet. Software that has not been adequately protected is an irresistible target for them, as indeed it is wherever cybercrime rears its head.

No doubt we can all recall incidents where the cybercriminals have struck hard. There was the ‘Zeus’ virus scam, used to steal around £675,000 from the bank accounts of some 3,000 on-line UK customers, while, earlier this year, US federal authorities charged three men with building and disseminating a virus that crippled NASA computers and brought in tens of millions of dollars for the East European-based cybercriminals.

And then there’s Alexsey Belan, for whom the FBI is offering a reward of up to $100,000 for information leading to his arrest. Belan is alleged to have penetrated the computer networks of three major US-based e-commerce companies, stealing their user databases and the encrypted passwords of millions of accounts, and then selling these on. Only look on the FBI’s website listing of ‘Cyber’s Most Wanted’ and you will find many more such examples of cybercriminals active in the region.

“Global cybercrime is arguably the biggest underworld industry of our times,” said Nir Kshetri, in the  report, ‘Cybercrime and Cybersecurity in the Global South’[1]. “Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry, estimated at US$1 trillion. Many of the economies in the Former Soviet Union and Central and Eastern Europe (FSU&CEE) have become top cybercrime hotspots.

“Cybercrime rings in these economies have mastered complex tricks and have increased pervasiveness and sophistication of cyberfrauds. Sophisticated frauds, such as cyberextortion, distributed denial-of-service (DDoS) attacks and hijacking users’ searches and clicks, involve a complex fusion of strategy, technology, processes and people,” he states.

“Corruption, the lack of sufficiently high penalties, ineffective, inefficient, inadequate and weak legislation and lax law enforcement have fuelled cybercrime,” Kshetri adds.

So, no matter how compelling your latest application or functionality may be, any vigilant customer will be aware of such dangers and see potential risk in installing your code, fearful that they might be putting malware on their computers, smartphones and other devices. Once unleashed, malicious code can wreak havoc, stealing personal and financial data, damaging files and systems, and compromising confidential information. Malware also poses a serious threat to the mobile environment, slipping into application stores and becoming a threat to anyone who downloads such infected applications.

Fixing the damage can exact a huge toll on those stores – in terms of time, money and disruption. And the damage goes deeper. Because, when application stores lose the trust of their customers, wireless providers and device manufacturers can lose customers, too. The ‘domino’ effect hurts everyone.

So, any developer keen to reap the upsides of Eastern Europe needs to be mindful of the downsides and ensure that the systems to protect their applications are in place. And that brings us to the good news. Software vendors and developers can digitally sign and timestamp the software they distribute over the Internet – known as 'Code Signing'– to demonstrate that their applications are safe, secure and trustworthy.

With code signing, everything starts from a position of trust – trust that the apps and downloads that customers install are free from viruses, spyware, or any other alteration or tampering that might compromise or damage their systems. And that isn’t all that’s at stake. Get it wrong and your hard-won brand and reputation could soon be in tatters.

This is where code signing solutions from Symantec come in to play, creating what is essentially a ‘digital shrink wrap’ for secure distribution of code and content over the Internet. Not only does this protect your software, but also it gives customers all the information they need to download and install your software with complete confidence.

Here’s how it works. When you are ready to publish new software and make it available on line, Symantec’s solutions enable you sign and timestamp your code, using a secure private key and digital certificate. The latter includes an encryption hash that allows customers to see all of the information in your digital certificate when they download your application, verifying your identity as the publisher, and confirming the integrity and trustworthiness of your software.

Also, Symantec fully supports multiple computing and mobile platforms, including an EV (Extended Validation) code signing solution that enhances the levels of trust on the latest operating systems, browsers and security software. Another plus for developers is that Symantec has partnered with Microsoft to integrate EV Code Signing certificate status with its SmartScreen reputation services in Internet Explorer and Windows 8. That means programs signed by an EV Code Signing certificate can immediately establish reputation with Microsoft’s SmartScreen, even if no prior reputation exists for that file or publisher; so, potentially there will be fewer warning messages flagged up when a user tries to run your application.

Ensuring that your software has these highest levels of authentication in place protects your brand every time and strengthens the trust relationships that make your business successful.

And with such protections in place, looking to Eastern Europe for the many code writing advantages it promises may well be a move that allows you to sleep that much easier at night.

 

Matt Rund of Symantec at mHealth Summit 2013

クリープウェア: 誰かに見られているかもしれない

$
0
0

creepware_title_banner.png

ラップトップコンピュータの Web カメラに目隠しを貼っている人がいます。皆さんも案外そうかもしれません。果たして、それは用心しすぎ、被害妄想、あるいはちょっと変わった行為なのでしょうか。それとも、そこまでする理由があるのでしょうか。自分のコンピュータで行動を見張られていた、あるいは Web カメラがいつの間にか侵入を受け、恥ずかしい映像や違法な動画を盗み出されて恐喝のネタにされたという話を聞いたことのある人も多いでしょう。そうした体験談は本当なのか、そして被害妄想と思えるくらい用心するのも無理もないことなのかと問われれば、残念ながら答えはイエスです。こうした行為に対する警戒は必要であり、この手の悪質な行為やもっと悪質な活動に利用できるプログラムは無数に出回っています。リモートアクセス型のトロイの木馬(RAT)は、被害者の知らないうちにインストールされるプログラムで、これにより攻撃者は侵入先のコンピュータにリモートからアクセスして、制御することができます。最近では、いつの間にか忍び寄る(Creep)その性質からクリープウェア(Creepware)とも呼ばれています。

今回のブログでは、このクリープウェアについて解説します。クリープウェアの実態と機能、これまでの被害の実状や今後、そして被害者と加害者について解明するとともに、アンダーグラウンド市場でのソフトウェアの流通から被害者の売買まで、クリープウェアの経済的側面にも検証します。最後に、クリープウェアの拡散方法と自衛手段についてもお伝えします。

詳しい説明を進める前に、まずはこちらの動画(英語)をご覧ください。この動画では、深刻化するクリープウェアの問題について知っておかねばならない内容をご紹介しています。

creepware_play_vid.png

図 1.この画像をクリックしてクリープウェアに関する動画を見る
 

クリープウェアとは

RAT とは、リモートからコンピュータを制御できるソフトウェアを総称するときによく使われる頭字語です。次のいずれの用語を表すときにも使われます。

  • リモートアクセス/管理ツール(Remote Access/Administration Tool)
  • リモートアクセス型/管理型のトロイの木馬(Remote Access/Administration Trojan)

「リモートアクセス型のトロイの木馬」は、ユーザーの知らないうちにインストールされて悪質な目的に利用されるという点で「リモートアクセスツール」とは異なります。リモートアクセスツールには多くの種類があり、テクニカルサポートや、旅行先から自宅または職場のコンピュータへの接続といった正規の用途で利用されています。ところが、リモートアクセスツールが備えている便利な機能そのものが、皮肉なことに悪質な行為にも利用できるため、そのような機能を想定した大量のマルウェアが設計されることになってしまいました。そうしたプログラムを「リモートアクセス型のトロイの木馬」と呼びます。攻撃者は、トロイの木馬がインストールされたコンピュータをほぼ完全に制御できるようになります。トロイの木馬の存在はなかなか気付かれることがなく、実際にコンピュータの前に座っているのとほとんど同じ操作が可能なので、Web カメラで映像を録画するのも簡単です。このように悪質で「いつの間にか忍び寄る」性質の活動が最近の事件で注目を集めたことから、リモートアクセス型のトロイの木馬を指して「クリープウェア」という名前が使われ始めました。

クリープウェアはクライアントサーバーモデルを採用していますが、クライアントサーバーシステムの設定を論じるときに想定する通常のモデルとは大きく異なっています。クリープウェアはこのプロセスを反転して、被害者のコンピュータをサーバーに、攻撃者のコンピュータをクライアントにします。被害者のコンピュータがクリープウェアに感染すると、攻撃者はそのコンピュータに要求を送ってファイルを取得したり、その他のさまざまな悪質な行為を実行したりできるようになります。
 

何が問題なのか

以前はクリープウェアもまだそれほど使われていませんでしたが、残念ながら現在では珍しくもなくなりました。クリープウェアのユーザーは、脅迫や詐欺で金儲けを狙うものから、無害な娯楽やいたずら程度にしか考えていないものまでさまざまです。両者の行為はまったく別物のように思えるかもしれませんが、どちらもコンピュータに不正にアクセスするという点では、倫理的に間違っているだけでなく、重大犯罪であることに変わりはありません。

特に懸念されるのは、クリープウェアのユーザーにモラルの欠如が感じられることです。クリープウェア専用のセクションが設けられた多数のオンラインフォーラムをざっと見れば、その傾向が如実に表れています。

creepware_blog_fig1.png

図 2.「シャレでやっているだけ」

creepware_blog_fig2.png

図 3.被害者に対する脅迫

こうしたフォーラムには、そもそもモラルなど持ち合わせていないユーザーが多いようですが、一部には物事の善悪についてひどく歪んだ考え方をするものもいます。あるスレッドには、クリープウェアによる RAT 行為を正当化するユーザーも存在し、信頼できない場所からプログラムをダウンロードしたりインストールしたりするほうが悪いと言って憚りません。

creepware_blog_fig3.png

図 4.被害者に対する暴言

また別のフォーラムには、何も気付いていない被害者をただ眺めているだけなら実害はないだろうと考えているユーザーもいます。

creepware_blog_fig4.png

図 5.プライバシーの侵害を正当化

クリープウェア(リモートアクセス型のトロイの木馬)に関連する無数の投稿を見ていると、ソフトウェアをセットアップして RAT 行為を始めるための助言を求めるユーザーが果てしなく湧いて出てくるように思えます。自分たちの行為に多少なりとも罪悪感を抱いているものは少数派であり、圧倒的多数は他人のプライバシーに立ち入ることが悪いとは微塵も思っていません。それどころか、RAT 行為によって金銭を得ることさえ悪事だとは見なしていないようです。「Morals of messing with people(いたずらのモラル)」というスレッドには、自分たちの行為が正しいのか仲間の意見を求めているユーザーがいました。

creepware_blog_fig5.png

図 6.モラルをめぐる悩み

寄せられた回答は、予想どおりの内容でした。

creepware_blog_fig6.png

図 7.「モラルなんて知るものか」

嘆かわしいことですが、クリープウェアのユーザーは被害者の受ける痛みがわからないか、あるいは気にもしていないようです。何も知らずにクリープウェアの犠牲になる人は多く、心に深い傷を負ったり、もっとひどい目に遭った人もいます。覗き行為を元に代償を求める手段のひとつが性的脅迫行為(Sextortion)で、これは身体的危害を加えない脅迫手段によって、被害者に性的な行為を強要するものです。

2013 年 8 月には、ミスティーン USA に選ばれた 19 歳のキャシディ・ウルフ(Cassidy Wolf)さんがクリープウェアの被害を受ける事件が発生しました。犯人は高校の同窓生で、彼女が寝室で着替えているところをクリープウェアを使って盗撮したのです。犯人は、その画像をインターネット上に公開すると脅して、もっと露骨な写真の撮影を強要しようとしましたが、彼女が警察に通報したことで、この高校生は逮捕され、他の国も含めて二十数人の女性たちをハッキングしていたことを認めました。

クリープウェアを使って、被害者のコンピュータ画面に「Web カメラの内部センサーのクリーニングが必要」だという警告メッセージを表示させる手口も大きく報道されました。この事件の場合、被害者は、Web カメラの内部センサーをクリーニングするにはコンピュータに蒸気を当てる必要があると指示され、何人かの女性はコンピュータを浴室に持ち込んだため、シャワーを浴びている映像を盗撮されてしまいました。

あいにく、こうした事件も、クリープウェアが実際の被害をもたらした事例のうち氷山の一角に過ぎません。被害者の多くはこの手の犯罪被害を届け出ることがなく、犯人が法の網に掛からないためです。攻撃者は盗み出したコンテンツや盗撮した画像をオンラインに公開すると言って被害者を脅迫するので、もしそうなったら一生噂がつきまとう可能性があります。一般に、このような嫌がらせやネットいじめは持続性があり、被害者が自殺に追い込まれることさえありえます。クリープウェアは、サイバーいじめにとっては理想的なツールと言えるようです。

クリープウェアと RAT は今や世界的な問題であり、世界中で悪質な目的に利用されています。

creepware_country_stats_600x600_mk2.png

図 8.過去 6 カ月間に RAT の活動が確認された上位 5 カ国
 

クリープウェアの機能

では実際、クリープウェアを使って何ができるのでしょうか。アンダーグラウンド市場にはクリープウェアプログラムが溢れています。いくつか名前を挙げるだけでも、Blackshades(W32.Shadesrat)、DarkComet(Backdoor.Breut)、Poison Ivy(Backdoor.Darkmoon)、jRAT(Backdoor.Jeetrat)などがあり、その多くは同様の機能セットを中核に備えています。ここでは、その中から Pandora RAT(シマンテック製品では Trojan.Pandoratとして検出されます)を詳しく取り上げます。

Pandora RAT を使うと、攻撃者は侵入先のコンピュータで以下のものにアクセスすることができます。

  • ファイル
  • プロセス
  • サービス
  • クリップボード
  • アクティブなネットワーク接続
  • レジストリ
  • プリンタ

加えて、攻撃者は以下のような活動を実行することも可能です。

  • 侵入先のコンピュータのデスクトップをリモートから制御する
  • スクリーンショットを取得する
  • Web カメラで映像を記録する
  • 音声を録音する
  • キーストロークを記録する
  • パスワードを盗み出す
  • ファイルをダウンロードする
  • Web ページを開く
  • 画面にメッセージを表示する
  • テキスト読み上げ機能を使って音声メッセージを再生する
  • 侵入先のコンピュータを再起動する
  • タスクバーを隠す
  • デスクトップアイコンを隠す
  • システムエラーやブルースクリーンを発生させる

使いやすさと美しいグラフィカルユーザーインターフェース(GUI)は、デザイン重視の現在では重要な要素ですが、クリープウェアでもそれは例外ではありません。Pandora RAT は、他の RAT と同じく、専門家だけでなく初心者でもすぐにマスターできる、使いやすい GUI を採用しています。かつては凄腕のハッカーしか使えなかったクリープウェアが、今やスクリプトキディからまったくの素人まで誰にでも手が出せるツールになってきたのです。

creepware_screen_shots_600x600_mk2.png

図 9. Pandora RAT のわかりやすいユーザーインターフェース

クリープウェアの使用目的は多種多様です。

  • 盗撮
    被害者の Web カメラやマイクを使って、密かに録音や録画を行う。
  • 情報やファイルの窃盗
    銀行口座やパスワードといった情報、画像や動画などのファイルをコピーまたは削除する。
  • 恐喝/性的脅迫行為
    コンピュータから盗み出した、または Web カメラを使って撮影した画像や動画を使って被害者を脅迫し、もっと露骨な画像や動画を撮影するためにポーズを取ることや性的な行為を強要したり、金銭を要求したりする。
  • 荒らしや煽り
    アダルト系やショッキングな Web サイトを開く、罵倒するメッセージを表示する、システムに損害を与えるなど、コンピュータに異常な動作を起こさせて、ただそれを見て楽しむ。
  • コンピュータを利用して DDoS 攻撃などを仕掛ける
    侵入先のコンピュータを利用して、分散サービス拒否攻撃(DDoS)や Bitcoin マイニングなど、被害者のリソースを悪用することで利益を得る何らかの行為を実行する。
     

クリープウェアの経済的側面

アンダーグラウンド経済においてクリープウェアは大きな市場であり、ソフトウェア販売を中心に急成長を遂げています。クリープウェア自体は、開発者自身の Web サイトや、ハッキング関連フォーラムに掲載されている広告から購入できます。そうしたフォーラムでは、FUD クリプターや JDB ジェネレータ、あるいはスレーブの広告がいくらでも見つかります。ここで挙げている用語を見慣れていない方は、定義を以下にまとめましたのでご覧ください。

  • FUD: 完全に検出不可(セキュリティベンダーによっても)。
  • クリプター: 実際のバイトをスクランブル化して検出されにくいようにファイルを再編成するツール。
  • JDB: Java ドライブバイ。Java アプレットを Web サイトに配置し、ユーザーがそのサイトにアクセスするとポップアップを表示してユーザー権限を要求する。権限が付与されると、クリープウェアがダウンロードされる。
  • スレーブ:クリープウェアに感染したコンピュータ。

難しそうに見えるかもしれませんが、クリープウェアをセットアップしたいと思ったら誰でも、作業代行を引き受ける「専門家」を見つけ出せば、それで済みます。サービスによって価格は大きく異なります。無料のクリープウェアや RAT も見つかりますが、有償版でも上限は 250 ドルほどで、FUD 暗号化やセットアップ費用といった追加コストが 20 ドルから 50 ドルです。しかし昨今のご多分に漏れず、オンラインで質問すれば無償で助言や説明を入手することができます。クリープウェアに関連するツールやヒント、手口などについて自分の知識を他人に伝えたいと考えているユーザーはたくさんいます。
 

自衛のために何ができるか

コンピュータをクリープウェアに感染させるには、以下の手法が考えられます。

  • ドライブバイダウンロード: Web サイトにアクセスすると、知らない間にクリープウェアがコンピュータにダウンロードされる。
  • 悪質なリンク:ドライブバイダウンロードをホストしている Web サイトにユーザーを誘導する悪質なリンク。ソーシャルメディア、チャットルーム、掲示板、スパムメールなどを使って拡散される。また、ユーザーアカウントを乗っ取って、友人から送信されたリンクのように見せかけたり、魅力的なメッセージで被害者を誘ったりする。
  • 悪用ツールキット:感染した Web サイトにアクセスしたり、悪質なリンクをクリックしたりすることで、悪用ツールキットがホストされている Web サイトにリダイレクトされる。そこで、どの悪用コードを利用できるかを判別するスクリプトが実行され、悪用が可能な場合、クリープウェアに感染し攻撃者に通知される。
  • ピアツーピアファイル共有/torrent: クリープウェアサーバーのインストーラが、人気のあるプログラムやゲームクラックなどのファイルにパッケージ化され、共有サイトで共有される。このファイルを実行すると、クリープウェアサーバーモジュールがインストールされる。

クリープウェアから保護するために、シマンテックは以下のことを推奨します。

  • ウイルス対策定義、オペレーティングシステム、ソフトウェアを常に最新の状態に保つ。
  • 不明な送信者からの電子メールは開かず、疑わしい添付ファイルもクリックしない。
  • 電子メールやインスタントメッセージで送られてきたリンクや、ソーシャルネットワークに掲載されているリンクがどんなに魅力的でも不用意にクリックしない。
  • ファイルは、信頼できる正規のソースだけからダウンロードする。
  • Web カメラが想定外の動作をしたら警戒する。Web カメラを使わない場合にはシャッターを閉じる。シャッターがなければ、使わないときにはテープなどで Web カメラをふさぐ。

現在、コンピュータは生活の中で大きな役割を占めています。これほど普及しているツールが、攻撃者の道具となって私たちのプライバシーを脅かすというのは、考えるだけでも恐ろしいことです。クリープウェアには確かに甚大な被害を及ぼす機能がありますが、しかるべき対策を講じることで自衛することが可能です。セキュリティソフトを常に最新の状態に保ち、基本的なセキュリティ対策に従っていれば、コンピュータにクリープウェアが忍び寄る心配はありません。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。

Default Chromeless Player

Application Virtualization Smackdown - Updated December 2013

$
0
0

An excellent summary on how Symantec Workspace Virtualization and Streaming can help simplify and gain a better ROI on your investment in VDI, Application Virtualization and BYOD. Why limit your virtualization investment to the Data center!

Application Virtualization Smackdown: analysis of Cameyo, Numecent, Microsoft, Spoon, Symantec and VMware by @PQRnl http://www.pqr.com/application-virtualization-smac...

Quanto è sicura la tua password ?

$
0
0

Prendendo spunto da un interessante articolo, "How Secure is Your Password?", che riguarda la sicurezza ed in particolare le password, è emerso che generalmente una password è meno al sicuro rispetto al passato.ù

Inoltre l'evoluzione delle tecnologie informatiche ha consentito di aumentare drasticamente le possibilità di scardinare le password anche con varie lunghezze e complessità, ecco un estratto di questo articolo :

"As an example of this in the last book, written in 2010, an 8 character password made up of both upper and lower case letters, numbers and symbols would have taken 2.25 years to crack.  The same password now would take just 57 days."

Nella tabella seguente è possibile visualizzare la complessità di una password confrontata al tempo di decrittazione della password tramite un attacco di forza bruta :

 

Pwd_complexity.jpg

 

Riferimento : How Secure is Your Password?

 

English post : How Secure is Your Password?


USB Swiss Army Knife : Tool per eliminare i documenti bloccati in coda di stampa

$
0
0

Un utile tool da aggiungere nella propria USB Swiss Army Knife.   Stalled Printer  Repair è un programma freeware portabile che consente di pulire la coda di stampa cancellando forzatamente i documenti inviati in stampa ma rimasti bloccati in coda.

Questo programma è un utile strumento per per ripristinare il il corretto funzionamento della periferica senza dover eseguire un riavvio del computer, come purtroppo accade nella maggior parte dei casi per problemi di questo tipo.
 

Caratteristiche :

  • Rileva la presenza di stampe bloccate nella coda di stampa
  • Forza la cancellazione della coda di stampa
  • Applicazione portabile: non è necessaria l'installazione e non scrive niente all'interno del registro di configruaizone.
  • Sostituisce il processo manuale di ripristino delle code di stampa

Nota: per eseguire il programma può essere richiesto di avere i diritti di amministratore locali.

 

Stalled Printer  Repair.jpg

Operating Systems :   

    Microsoft Windows NT 4.0
    Microsoft Windows 2000
    Microsoft Windows XP
    Microsoft Windows Vista
    Microsoft Windows 7
 

LinkStalled Printer Repair
 

Download: Download from Official Site

English article : USB Swiss Army Knife : Portable tool to Detect and Repair Stalled Print Jobs

DRT Dozen - part 2: Security, Bitcoin, and DR

$
0
0

2nd installment of the DRT Dozen blog

Search for a filename in Enterprise Vault FSA

$
0
0
From time to time I dip in to the 'other world' of FSA with Enterprise Vault. I know I'm a die-hard Exchange mailbox archiving knowledge-base - normally.  But I do know a thing or three about FSA, really, I do! In this little blog post I'll explain how you can search an FSA archive for a file with a particular name.
 
Just Search?
 
Surely the answer to searching by filename is just to launch search, and put in the filename and click 'Search'?
 
Well, no.
 
When you use search to look for data it searches the whole of the items, so searching for a name like *MyCV* would give you hits from both filenames with that in their name, and content of files too.  Not what we want in this situation.
 
Advanced Search
 
The way forward is to use Advanced Search.  Here is a screenshot:
 
search-for-a-filename.png
 
What you have to do is put the filename in the *subject* field - which is a little bit odd.  But it works!
 
To my mind it's a bit 'odd' that you have to run an advanced search in order to be able to search for a particular filename, but I suppose things had to implemented in some way, and the default search as implemented so that it searched content, rather than filenames.
 

Time to Get Serious about Endpoint Security

$
0
0

Time to Get Serious about Endpoint Security

 

Time. Whatever business you’re in, there’s just never enough of it. That’s why today’s host of computing devices are so invaluable to small businesses where agility, flexibility, fast turn-round times and lightning-quick responses are vital to success and survival.

Home, hotel, café, client site – with laptops, tablets and other mobile technologies now complementing the ‘traditional’ desktop, anywhere is good if you need to get busy, get an answer, get creative or simply get in touch.

But the many benefits of the endpoint explosion come with a health warning. And that’s because endpoint security poses a potential minefield that every small business needs to detect and defuse effectively.

 

ENDLESS ENDPOINTS – WHAT YOU NEED TO KNOW

Any endpoint used by any employee is a possible weak spot in your network – a potential route in for malware, a potential route out for confidential data and so a source of danger to the functionality and integrity of your business. And simple maths means that the more endpoints your employees use, the bigger the risk – a risk compounded by the fact that, attracted by the less formidable defences protecting many smaller firms, cyber-criminals are increasingly aiming their firepower away from larger enterprises. Over 35% of targeted malware attacks are now directed at small and medium-sized businesses.[1]

Cyber-criminals are also expert at exploiting complacency, loss of vigilance or sheer sloppiness – in fact, every kind of casual behaviour fostered by the endpoint explosion as more users work ‘on the run’ and blur the sharp edges that once demarcated office hours from leisure time. A single click by a single employee on an infected attachment or a link to a malware-infected website may trigger the tripwire and pollute your network or put it out of action, damaging your ability to do business and maintain your client base. Make no mistake – this threat is very real. 59% of smaller firms’ customers have taken their business elsewhere due to a supplier’s unreliable IT system.[2]

And there’s another problem too – our old friend, time. Every endpoint adds to the burden on your IT resource. Protecting each device, checking its security status, keeping pace with patches/updates – as more endpoints get deployed across your business, it all adds up to a task that’s ever more demanding, thankless…and ravenously time-hungry.

 

FINDING A MADE TO MEASURE SOLUTION

What every small business needs is endpoint security that’s effective and comprehensive, covering every desktop, laptop, tablet and file server too. But it also needs to be a perfect match for companies with limited IT budgets and limited in-house expertise. In other words, it’s a question of pinpointing a solution that delivers maximum benefit and minimal burden.

The first priority is to identify a single solution that can meet all your requirements, avoiding the need to rely on a piecemeal approach chaotically combining multiple offerings (perhaps from multiple vendors) and eating up management time as a result. But in a crowded market crammed full of promises, assurances, claims and impenetrable statistics, which solution should you choose?

In July 2013, Dennis Technology Labs, a fully independent hardware and software testing facility respected around the world, published some enlightening results.[3] Assessing five different market-leading anti-malware products, it awarded a triple-A rating to just one of them: Symantec Endpoint Protection Small Business Edition 2013. As well as outgunning its rivals in terms of anti-malware protection, this was also the only solution of the five not to produce a single false positive.

 

TICKING ALL THE BOXES FOR SMALL BUSINESSES

As its name suggests, Symantec Endpoint Protection Small Business Edition 2013 is specifically designed to meet the needs of small businesses. First and foremost, it deploys world-class anti-virus, anti-spyware, intrusion detection, data encryption and real-time behaviour monitoring under a centrally managed security umbrella – delivering benchmark protection no matter where employees or endpoints are located and no matter what private or public network they use to connect to the internet.

Leveraging the power of the Symantec Global Intelligence Network, this service defends you against unknown as well as known threats, with updates provided automatically via the internet to every endpoint every 5-15 minutes – and its pay-as-you-go subscription model ensures the financial predictability vital to sound cash flow management. Moreover, because the service is cloud-based (though an on-premise version is also available), no special hardware or management software needs to be installed on-site.

Crucially, it’s deliberately designed to minimise the load in terms of set-up and day-to-day administration. Set-up is a simple process taking a matter of minutes, while an easy to use, Web-based, access-anywhere console provides at-a-glance data covering each endpoint, its health and its security status. Extra endpoints can be added quickly and easily, with 24/7 support on tap to deal with any question or issues. All of this is perfect for the busy small business – just consider how one firm that uses the service estimates that a minute or two a week is all it takes to manage it via the administration portal.[4]

Safeguarding your company’s cyber-security is a serious business. And in Symantec Endpoint Protection Small Business Edition 2013, you’ll find a solution custom-made to ensure that firms like yours can seize the benefits of the endpoint explosion while keeping the threats and frustrations at bay. This is a service that represents the arrival of the ideal endpoint security solution for small businesses. And it’s about time.

For a free trial of Symantec Endpoint Protection Small Business Edition 2013, click here

 

From the Early Lark to the Tardy Owl, Spammers Intend Catering to All This Christmas

$
0
0

Contributor: Binny Kuriakose

‘Hello world’ we are digital! Well that was ages ago. Today the need for speed has made us extra fast. A click of a button and the desired webpage is up and running in an instant. In fact, organizations are switching to the Web because of cost effective business and global presence the Internet provides. This phenomenon has made predators smack their lips. What better environment to make a kill than Christmas, with the unaware and the vulnerable abound!

With a systematic study of business done during Christmas, spammers have leveraged a plethora of categories since early July, ranging from hospitality-related spam for those who plan early on how to celebrate Christmas later in the year, to last minute shoppers who scramble to buy gifts before rushing home. Now, that is a well-planned spread.

  • For the vacation planner, there is a hospitality-related spam, with headers reading:

From: Christmas Luxury <[name]@[domain].com>
Subject: A journey of Christmas luxuries

figure1_5.png

Figure 1. A preview of hospitality spam

  • For the one in need of cash, there is the odd Nigerian type lottory promotion. The email header reads:

Subject: XMAS PROMOTION!!
From:"[Brand name] JACKPOT COMPANY INC."<[name]@[domain].com>

figure2_3.png
 

Figure 2. A preview of a Nigerian-type spam

  • For those intending to gift something memorable, there are blocks, chocolates and ornaments to gift. The emails have the following headers:

From:"[Brand name] giving an oil painting"<[name]@[domain].com>
From: Christmas Luxury <mail@[domain].com>
From: Chocolates Inquiry <mail@[domain].com>
From:"Holiday Ornaments"<Holiday.Ornaments@[domain].com>
Subject: Exclusively Designed Christmas Ornaments
Subject: Delicious Christmas Chocolates !
Subject:★ Attention Early Birds
Subject: A journey of Christmas luxuries
Subject: as a Christmas gift"[Brand name]

figure3_2_0.png

Figure 3. A preview of personalized gifts spam

  • For the early birds who prefer to buy watches and designer products this Christmas, there are a range of replica products at throw away prices with the following email headers:

From: "Early x-mas shopping"<[name]@[domain].com>
Subject: [Brand name] Smart Phone Clearout. 55% off MSRP
Subject: Thinking about Christmas?
From:"[Brand name]"<[name]@[domain].com>
Subject:★ Attention Early Birds
Subject: Great for Christmas
From:"Join us AT "[Brand name]"<[name]@[domain].com>
Subject: Christmas coming soon!! . Are you ready for the hot selling reason.
From:"[Brand name] <[name]@[domain].com>

figure4_3.png

Figure 4. A preview of a replica spam

Figure5_0.png

Figure 5. A preview of product spam

  • For those who intend to get in shape for Christmas, there are weight-loss related spam that claim to get you thinner instantly! The headers have the typical enticements as shown below:

Subject: BY Christmas Drop 23lbs
Subject: Look 23lbs thinner Christmas
Subject: Did you see me on television Thursday?
From:"[Brand name]"<[name]@[domain].com>

Figure6_0.png

Figure 6. A preview of medicine-related spam

  • For the young at heart, there is dating spam with the following headers:

From:"Date Someone"<[name]@[domain].com>
From:"Senior Dating"<[name]@[domain].com>
Subject: Find a hot Christian this Christmas in your area
Subject: Find a local love to cuddle with this Christmas

Figure7.png

Figure 7. A preview of dating spam

  • For your kids, there are personalized surveys with Santa’s greetings, specially crafted for your needs. The email header reads:

From: Santa <Santa@[domain].com>
Subject: Letters from Santa for your child

Figure8.png

Figure 8. A preview of personalized spam email for kids

Figure9_0.png

Figure 9. A pie chart depicting Christmas spam volume

Overall, the spam panorama this Christmas looks pervasive. The aim is to harness curiosity laced with fantastic offers that can exploit unhealthy user practices, unsecured systems and half-baked solutions. The focus of spammers continue to be on how to best understand and exploit human tendencies and then to entice users to either compromise sensitive information or visit a dubious webpage.

Symantec advises users to pay attention to details while judging the genuineness of the mail by considering the following:

  • Did you subscribe or unsubscribe to such offers in the past?
  • Is it one of those forwarded mails a friend has been ensnared into?
  • Is the sender, the context and content of the mail authentic?

We encourages users to be alert during this festive season while dealing with online offers through emails. Symantec has protection in place to stop malware and spam and advise users to regularly update antivirus signatures to stay protected from latest threats. Protect yourself and limit the amount of your personal information on the public domain.

Symantec wishes you a safe and merry Christmas.

NetBackup 7.5.0.7 (NetBackup 7.5 Maintenance Release 7) is now available!

NetBackup Appliances 2.5.4 is now available!

$
0
0

NetBackup Appliances 2.5.4 is also here!


Instagram のデマ: 10 万人以上のユーザーがアカウント削除に関する偽のメッセージをシェア

$
0
0

この週末、写真共有アプリ Instagram で大量のアカウントが削除されるというデマが広がりました。@activeaccountsafe という偽アカウントから、Instagram のプライバシーポリシー変更に関する通知と称する写真が投稿されたのです。この写真は、次のような文面でした。

「On December 20, 2013 we will be randomly deleting a huge mass of Instagram accounts. Many users create multiple accounts and don’t use them all. This cost us $1.1 million to run inactive accounts. These accounts become inactive and then create spams. In order for us to keep al spam off of Instagram we will be randomly deleting accounts. To keep your account active REPOST this picture with @ActiveAccountSafe & #ActiveAccountSafe . We’re doing this to keep active users online.
(2013 年 12 月 20 日に、大量の Instagram アカウントをランダムに削除する予定です。複数のアカウントを作成したまま、まったく使っていないユーザーが多数になり、使われていないアカウントの維持だけで 110 万ドル掛かっています。しかも、使われていないアカウントはスパムに利用されています。ランダムにアカウントを削除するのは、Instagram からスパムを一掃するためです。お使いのアカウントのご利用を続けたい場合には、@ActiveAccountSafe と #ActiveAccountSafe を付けてこの写真をシェアしてください。これはアクティブなユーザーの皆様に今後もサービスをご利用いただくための措置です)」

Instagram Hoax 1 edit 2.png

図 1.デマを拡散する Instagram アカウント @ActiveAccountSafe

このアカウントには 10 万近いフォロワーがおり、ハッシュタグ #ActiveAccountSafe も 15 万近い投稿に付けられていました。

Instagram Hoax 2 edit 2.png

図 2. 15 万近い投稿で使われたハッシュタグ #ActiveAccountSafe

先日も、10 万人の Instagram ユーザーが欺かれてログイン情報を提供してしまうという詐欺がありました。今回は、そのときとは異なり、Instagram のログイン情報を使ってログインするように求める指示はなく、単に写真をシェアするよう求めるだけでしたが、その意図は明白です。ソーシャルネットワークのユーザーは絶えず詐欺やスパム、デマに狙われており、こうした攻撃は成功しています。だからこそ、このような行為は後を絶たないのです。

12 月 20 日に大量のアカウントが削除されるというのはまったくのデマですので、Instagram ユーザーは心配する必要はありません。Instagram は、すでにこの偽アカウントが無効にしており、ハッシュタグも検索できないようになっています。

プライバシーポリシーの変更などがあるか確認するには、公式の Instagram アカウントをフォローし、Instagram のブログで更新情報を確認するようにしてください。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。

How to recreate Enterprise Vault shortcuts

$
0
0
From time to time it might be necessary to try to recreate shortcuts for Enterprise Vault archived items. Unfortunately there isn't yet a sophisticated way to do this, it's a lot of manual effort.  In this blog I'll explain the way that this currently done:
 
The Idea
 
The idea is that we can export the whole of an archive to PST, delete all the shortcut items, and then reimport the PST recreating every single shortcut as we go along.
 
The downsides
 
If the user has the option to delete just shortcuts, legitimately, then following this approach will bring them all back. This might be what the user wants, on the other hand it might annoy the user. There are some ways and means around this, for example you could elect not reimport anything for the user, just give them the PST file of their archive.  Calendar, contacts and other non-shortcut archived items might end up getting duplicated, if they've been archived in the past... since we have no easy way to delete them.
 
The prep
 
You have to make sure that the user option for deleting shortcuts is set to either 'ask' or 'shortcut only' otherwise the items will be deleted from the archive too
 
In practice
 
The high level process is:
 
- Export the archive to PST
- Create a search folder in Outlook, where the message class is IPM.Note.EnterpriseVault.Shortcut
- Select items in batches and delete them using the search folder
- Reimport the PST file, selecting the option to recreate shortcuts along the way
 
Variations
 
During the export you may wish to delete the items from the archive as you go along. I'd suggest, in order to have a belt and braces approach, that you export to PST twice.  The second time around you delete the items from the archive too.
 
Summary
 
It's a pain to have to do things this way, maybe there is a tool-possibility in this area!  Have you ever followed a procedure like this to recreate mass-accidentally deleted shortcuts? Let me know in the comments below.
 

The State of Financial Trojans in 2013

$
0
0
“Because that’s where the money is!” This is a quote frequently attributed to Willie Sutton as the answer he allegedly gave when asked why he robbed banks. Even though Mr. Sutton never gave this answer, it still holds true. 
 
This paradigm also holds true when it comes to today’s financial malware. Online banking applications are where money is moved; hence they are also the focus of attackers. It should not come as a surprise that we still see further development of Trojans targeting online banking services. One example that we recently blogged about is the Neverquest Trojan, a successor of Trojan.Snifula, which was first seen in 2006 but is still in use. 
 
The number of infections of the most common financial Trojans grew to 337 percent in the first nine month of 2013. This represents nearly half a million infected computers per month that are susceptible to fraud. To get a better understanding of the mechanics behind financial Trojans and the scale of their operations, we analyzed over one thousand recent configuration files belonging to eight online banking Trojans. These configuration files define which URLs the Trojan should attack and what attack strategy to use. Attacks vary from simple user redirection to complex Web-injects, which can automatically conduct transactions in the background. The analyzed configuration files targeted 1,486 organizations in total. This highlights the wide distribution of the Trojans, which target everything that could yield a monetary profit for the attacker.  
 
The most frequently attacked bank is located in the US and was present in 71.5 percent of all the examined Trojans’ configuration files. All of the top 15 targeted banks were found in more than 50 percent of the configuration files. This means that every second Trojan targets at least one of these banks. These high numbers might be because the targeted URLs are present as examples in some of the basic toolkits, which are sold with the Trojans. Another reason could be that the Trojans simply still work against these firms, as not all financial institutions have moved to strong authentication yet. Of course, most financial institutions are aware of these cybercrime developments and are deploying new protection mechanisms to block such attacks. Unfortunately, new security measures take time and money to roll out and the attackers will always come up with new attack avenues. After all, social engineering attacks still work, since some people will always fall for a cleverly crafted story. We expect that we will continue to see attacks targeting online banking services in the coming year.
 
If you want to learn more about the state of financial Trojans, we released an updated whitepaper on this topic.
 
We also have the following infographic on 2013’s financial threat landscape.
 
the_state_of_financial_trojans_infographic_v1.1_0.jpg

Symantec Intelligence Report: November 2013

$
0
0

Welcome to the November edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

November saw another increase in the number of targeted attacks. While these numbers are up slightly compared to October, they’re almost double the number of targeted attacks during the same month in 2012, though still much lower than their peaks this summer.

This month we saw another large data breach reported, where 42 million identities were exposed as a result. However, the breach apparently took place in January, resulting in an increase in overall numbers for the beginning of this year.

It appears that the email virus rate increased in November, where one in 235 emails contained a malicious attachment. This is up from one in 437 emails last month, and the highest rate we’ve seen since November 2012. In terms of industries most likely to encounter malicious emails, the Public Sector tops the list at one in 62 emails. The United Kingdom tops both the source and destinations locations for the month.

In other news, spam rates dropped 5.5 percentage points to 62.2 percent of email, fake offerings still top the list of social media attacks at 82 percent, 36 percent of all malicious mobile apps track user activity, and 438 new vulnerabilities were disclosed during the month.

We hope you enjoy the November Symantec Intelligence Report. You can download your copy here.

Equality Means Business - The Business Case for Women's Empowerment

$
0
0

Last week the world celebrated International Human Rights Day. In honor of this we’re featuring a series on how Symantec promotes the rights of all people, through various diversity efforts and initiatives. Our first post announced Symantec’s perfect score of 100 in the Human Rights Campaign’s Corporate Equality Index (CEI) for the sixth consecutive year. Today we discuss Symantec’s pledge to the Women’s Empowerment Principles (WEP) and what this means for women’s rights at Symantec and across the world.

 

Research shows that:

  • Organizations with the most gender diversity on their Boards of Directors financially outperform companies with the least;
  • Companies with the most women board directors outperformed those with the least on return on sales by 16 percent and return on invested capital by 26 percent; and
  • An employment rate for women equivalent to that of men would boost economic growth by five percent in the US, and by more in developing countries.

Additionally, a diverse workforce brings many other benefits to a business such as:

  • Reduced costs (e.g., absenteeism and turnover)
  • Attracting top talent as an employer of choice
  • Increased productivity, profitability, and engagement
  • Tapping new markets and building customer loyalty

Due to the incredible efforts of businesses, the public sector, NGOs, universities and more, women’s equality has come incredibly far, and the business case is only getting stronger. Last year, we saw the appointment of Marissa Mayer as the new Yahoo! CEO and this week General Motors named the first female Chief Executive for a US car maker.

HOWEVER….in nearly all parts of the world, women still face discrimination in most areas compared to men:

  • There are 774 million illiterate people in the world today; two-thirds are female;
  • Women currently hold just 4.5 percent of Fortune 1000 CEO positions; and just 6.1% of FTSE 100 executive positions;
  • Women make up the majority of the world's farmers in rural areas, but only 1% worldwide own land; and
  • In the film industry, recent studies show that 70 percent of the speaking roles in 2012's 100 highest-grossing movies belonged to men; of the top 250 movies only 9% of directors are female.

The Women’s Empowerment Principles (WEP)

At Symantec we are proud to be a founding signatory of the Women’s Empowerment Principles (WEP)— a partnership initiative of UN Women and UN Global Compact (UNGC) that provides a set of considerations to help the private sector focus on key elements integral to promoting gender equality in the workplace, marketplace and community. In the international community and global business world, these are the recognized principles and standards for women’s equality.

We adhere to these principles as our guiding framework to attract and develop a diverse employee base. Through this and other public-private relationships, Symantec demonstrates its unwavering commitment to increase diversity in the workforce. And we are not alone - in September this year, the total number of CEOs endorsing the WEPs totaled more than 600, covering 40 countries and a range of sectors.

In 2012 our CEO Steve Bennett endorsed the WEP, and since this time we’ve made tremendous strides towards implementing the WEPs and promoting equality for women.

For example, our WEP Key Stakeholder Committee—a cross-functional team working to integrate the WEP into our business functions—took important steps in Fiscal Year 2013 to formally recognize professional development and training exercises offered through the 14 Symantec Women’s Action Network (SWAN) chapters across the globe. Employees participating in SWAN events and trainings are now able to receive Learning Excellence Credits (LECs) for their time—a change that will further support SWAN’s mission to advance women’s careers at Symantec. Additionally:

  • Symantec joined the WEP Leadership Group to help drive development and bring awareness not only to the WEPs, but the issue of women’s empowerment;
  • At the end of FY13, women in leadership at Symantec was up from 25 percent to 27 percent, matching the overall percentage of employees who are women;
  • We’ve increased our support of nonprofit partners that help advance underserved populations, such as the Anita Borg Institute, TechBridge, National Center for Women & Information Technology and the San Francisco Gender Equality Challenge;
  • A Symantec employee served on WEP Advisory Committee and Symantec co-sponsored International Women’s Day which is a WEP initiative;
  • We purchased a three-part “Women in Leadership” e-learning series, available to all employees; and
  • Since its inception in 2011,  Symantec has sponsored the TechWomen program (an initiative of the U.S. Department of State’s Bureau of Educational and Cultural Affairs (ECA)), supporting professional mentorship and exchange programs for women in IT from the Middle East and North Africa.

“Symantec has a longstanding commitment to advancing and empowering women in the workplace and we fully endorse the Women’s Empowerment Principles. The Principles provide us with a framework to ensure that Symantec remains a place where innovative ideas can flourish, and where both women and men can have productive and satisfying careers.” – Symantec CEO Steve Bennett (2012)

We look forward to continuing our efforts and fostering the talent of our incredible female workforce at Symantec; and to ensuring women’s equality continues to improve in the workplace and in all realms of life.  

 

John McGoun is Symantec's Senior Director of Global Operations. He is also a member of Symantec's Women's Empowerment Principles Committee.

 

Viewing all 5094 articles
Browse latest View live




Latest Images