New PCI E-Commerce Guide Advocates SSL
In the world of e-Commerce, the strength of encryption that you employ – and the use of Extended Validation SSL (EV: a highly rigorous and demanding standard of verification) – needs to be beyond all...
View ArticleWhen using FSAUTILITY to bulk recall files how can progress be tracked?
A question which appeared on the forums the other day was worthy, I think, of further investigation. It's one of those questions that you think should be 'obvious' or 'easy' but of course it's not...
View ArticleRationalising Script Tasks in DS6.9
Today I'm taking a break from Shylock woes and instead looking at an issue one of the team raised regarding inconsistent jobs on our deployment server. Specifically, we've got two versions of a script...
View ArticleJust having fun.
It feels like my freshman years in the IT business, where there is no fear, not a single worry. Beer and pizza will be there later, and all things will work it's self out.Well I am lost for words on...
View ArticleMail and jornal archiving tasks are failing with error 3305, 2256
We are running Symantec Enterprise Vault 9.03 with Exchange 2003. It has been running fine for the last three years.Recently, we upgraded to Exchange 2010 and added new targets and created new tasks....
View ArticleUpswing in Ransomeware
In collaboration with the SECURITY RESPONSE TEAMAs we predicted toward the end of last year, we’re already seeing an upswing in ransomware activity in 2013. The ransomware extortion scam has been in...
View ArticleSaving Space: Advantages to using Veritas Operations Manager
My role as a Systems Administrator and storage provisioner often results in requests for additional space, usually from an Oracle database administrator. This often provides a challenge, as working...
View Article‘Good Enough’ Protection in the Cloud
There is a lot of fear out there when it comes to dealing with the cloud, especially with so much hype surrounding the technology. However, what you do, and do not, commit to the public cloud is...
View ArticleThe Windy City Breezes Through Another Successful Cyber Readiness Challenge
On February 5, 2013, Symantec hosted another Cyber Readiness Challenge event; the series promotes discussions surrounding the evolving cyberthreat landscape with an end goal of helping organizations...
View ArticleCross-Platform Frutas RAT Builder and Back Door
Contributor: Val S.We recently came across a sample of a back door remote access tool (RAT) written entirely in Java. The RAT is freely distributed on underground forums, free for any registered forum...
View ArticleServiceDesk Pack 7.5 for Altiris™ IT Analytics Solution 7.1 SP2 from...
ServiceDesk Pack 7.5 for IT Analytics 7.1 SP2 User Guide is now live at the following location:http://www.symantec.com/docs/DOC5639
View Article日本のオンラインバンキング利用者のみを標的にする Zeus
これまでにも何度かこのブログでご報告したとおり、Zeus(Trojan.Zbot)などオンラインバンキングを狙うトロイの木馬が、しばらく前から世界中のオンラインバンキング利用者にとって頭痛の種になっています。日本を含む一部の国や地域は、これまでオンラインバンキングを狙うトロイの木馬の被害を免れてきました。理由はおそらく言葉の壁であろうと考えられますが、何か別の理由があったのかもしれません。しかし、警...
View ArticleLadyBoyle 攻撃に悪用された Adobe 製品のゼロデイ脆弱性
2 月 7 日、Adobe 社は 2 つのゼロデイ脆弱性(CVE-2013-0633、CVE-2013-0634)を修正する緊急パッチを公開しました。これは、Windows 版と Mac 版両方の Adobe Flash Player 11.5.502.146...
View Articleクロスプラットフォームの Frutas RAT ビルダーとバックドア
寄稿: Val S.最近シマンテックは、すべて Java で記述されたバックドアリモートアクセスツール(RAT)のサンプルを確認しました。RAT はアンダーグラウンドフォーラムで無料配布されており、フォーラムに登録すれば誰でも自由にダウンロードすることができます。このツールは Frutas という名前で、これはスペイン語で「フルーツ」を意味します。 図 1. Frutas のロゴ Frutas...
View Articleマルバタイジング(悪質な広告)と動的 DNS: 果てしなき闘い
寄稿: John Harrisonシマンテックは、ある大規模なマルバタイジング(悪質な広告)活動を 5 カ月以上にわたって追い続けてきました。この活動は現在も盛んに続いており、動的 DNSを使って追跡の目を逃れています。この活動は急速に広がり、有名なドメインやアダルトサイトに侵入しました。Alexa ランキングで 5,000...
View ArticleHow to 'Move' the Enterprise Vault Reports folder
Sometimes Enterprise Vault can produce quite sizeable report files in the REPORTS subfolder of the main Enterprise Vault installation folder. There isn't a configuration option within Enterprise...
View ArticleSymantec Website Solutions
L'obiettivo del team Symantec Website Security Solutions è di realizzare offerte integrate di qualità in grado di assistere i nostri clienti a raggiungere i loro traguardi. Aiutiamo le società di...
View ArticleWhen Resiliency and Contingency is Critical to the Business
A lot of you know that I’ve been hanging around Health IT for over 20 years. Some of you know that I’ve been involved in IT for nearly 30 years. A few of you may know that well before I discovered...
View ArticleWebcast | Archive Migrations: Best Practices for Moving Archived Content
Wondering what the best practices for moving archived content are? Join Symantec for a webcast on February 19th at 10 a.m. PST to find out exactly what strategy your organization should take. Our...
View ArticleApplication Virtualization Smackdown!
Are you looking for an independent overview of the Application Streaming and Virtualization solutions and curious about the different features- and functions each Application Virtualization vendor is...
View Article