Info for Backup Exec's support for Win2012
Hello all, I've been getting a lot of inquiries about Win2012 support in BE. Please visit the Beta blog for more information:...
View ArticleMicrosoft Privilege Exploitation in 2012
With the new year upon us, time for Arellia’s 2012 analysis of Microsoft vulnerabilities and those with privilege exploitation:Bulletins83Vulnerabilities172Bulletins with Privilege...
View ArticleMobile innovation is moving from hardware to software – are organisations ready?
Mobility is arriving at a plateau. The very fact that the iPhone 5 was met with more of a mixed reaction than previous iterations is testament to the fact that it is not enough for a device to simply...
View ArticleUpcoming Twitter Chat on Targeted Email Attacks
Join hashtag #MailSec and learn more about the dangers of targetted email attacks and how to prevent them.Takedowns of large botnet rings in recent years have caused spam numbers to plummet. However,...
View ArticleElderwood Project Behind Latest Internet Explorer Zero-Day Vulnerability
In our recentblogs about the latest Internet Explorer zero-day vulnerability, we explained what watering hole attacks are and referenced our research paper about the Elderwood Project. The paper...
View ArticleSSR and Hyper-V_VM Protection
Hello allI am making a blog post after a long time but now onwards I will be regular!We keep getting queries on best practices/ways to protect Hyper-V VMs with SSR, so here is some useful...
View ArticleLinkedIn: Three tips to get you started (or moving again)
Happy New Year, Partners! Here's a fresh opportunity to recommit yourself and/or your company to efforts on social channels. And if there’s one place your company should have a social presence, it’s on...
View ArticleWebcast: NetApp Talks About Symantec Data Insight
Did you miss the webcast, "Manage Unstructured Data with Symantec Data Insight for NetApp Storage Systems," last month with guest speaker, Sharyathi Nagesh, NetApp Technical Marketing Engineer? Listen...
View ArticleSymantec at the NetApp Insight Conferences
It has been a busy end of 2012 indeed. Last November and December, a few of my colleagues and I represented the Storage and Availability Management team at the back-to-back NetApp Insight conferences...
View Article2013 - A Look Forward
I was thinking the other day, whilst waiting for Santa Claus, of all the things that I'd like to see or do in 2013. The main things are: The next Enterprise Vault 10.0.3 Service Pack - there are some...
View ArticleHow to remove files that can not remove by 'You require permission from...
After verifying backups by restoring files to alternate location, it sometimes happens that we can not remove restored files by 'You require permission from TrustedInstaller to make changes to this...
View Article「水飲み場」型攻撃に悪用された Internet Explorer の新しいゼロデイ脆弱性
Internet Explorer の新しいゼロデイ脆弱性が悪用されているという複数の報告が寄せられています。第一報によれば、この攻撃に使われている Web サイトは米国に拠点を置くシンクタンクのものでした。このサイトは、いわゆる「水飲み場」型攻撃の一環として侵入を受け、ゼロデイ脆弱性の悪用に利用されたと考えられ、攻撃の日付は 12 月 21 日に遡ります。 Internet Explorer...
View Article「水飲み場」型攻撃に利用された Internet Explorer のゼロデイ脆弱性に関する Q&A
前回のブログ記事で、Internet Explorer の新しいゼロデイ脆弱性が頻繁に悪用されていることをご報告しました。Microsoft 社はその後、セキュリティアドバイザリ 2794220を公開し、Microsoft Internet Explorer の 'CDwnBindInfo'...
View ArticleGartner names Symantec the Only 7-Time Leader* in DLP
By Robert Hamilton, Director Product Marketing, SymantecOne of the most damaging events a business can experience is the loss or theft of sensitive information, be it proprietary information about the...
View ArticleStakeholders, Accountability and Operational Risk
Stakeholders are becoming increasingly concerned about accountability and management of operational risks. Regulations like HIPAA, Sarbanes-Oxley, and Basel II are placing requirements that are more...
View Article休止を経て復活した Virut ボットネット
以前、W32.Virutというファイルインフェクタをこのブログで取り上げたことがあります。それだけではなく、ボットネットのシャットダウン要請に関する考察も掲載しました。最近の訴訟手続きによって Virut のコマンド &...
View ArticleAndroid.CoolPaperLeak - ミリオンダウンロードベイビー
寄稿: Cathal Mullaneyアダルト画像でユーザーを誘い込み、マルウェアやセキュリティリスクをコンピュータに仕込むという手法は特に目新しいものではありません。シマンテックは最近、この「アメとムチ」のテクニックを用いたアプリを 3 つ発見しました。いずれも Google Play で公開されていたもので、累積で 500,000 回から 1,500,000...
View ArticleAltiris 7.1 migration, Day 3
A few days in to the migration, have some questions came up. So lets go through it.Our infrustructure is more like 1 huge building than 80 separate sites. The availability of having fiber connected to...
View ArticleDownloader.Ponik Seeks Long Term Relationship
Contributor: Jeet MorpariaOnline dating is big business. In 2012, 40 million people visited or used an online dating site in the United States. According to some statistics, the online dating industry...
View Article