Being scammed at home
If you don't care for the details of this blog, there is a Summary at the bottom. Recently I was called, at home, informing me that my computer was “downloading viruses”. This is the fourth time this...
View ArticleCome verificare la versione di Office installata
Per conoscere la versione di Microsoft Office Version installata in un computer, vi sono alcune possibilità ( ad es. aprendo una applicazione Office, da pannello di controllo ecc.). Una soluzione...
View ArticleMaking Everyday Mandela Day – How Symantec Employees across the Globe are...
“We can change the world and make it a better place. It is in your hands to make a difference.” - Nelson Mandela “We can change the world and make it a better place. It is in your hands to make a...
View ArticleSymantec e-Campus for Technical Product Training is free for all!
Better Training for All Members of the Symantec eLibrary receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of Symantec's product...
View ArticleCómo perder tu negocio en una semana: caso CODESPACES.COM
En este post me gustaría reflexionar acerca de los riesgos ocultos en cierto tipo de decisiones y elecciones tecnológicas. Las tecnologías como tal no entrañan riesgos (cloud, replicación, snapshots,...
View ArticleVision Symposium Munich
Vision Channel Day, 8th July 2014 | Vision Symposium, 9th July 2014In 2014, Symantec is creating a multi-day, flagship event, Vision Las Vegas, which will kick off a series of two-day events in cities...
View ArticleHow to lose your business in one week: CODESPACES.COM case
Today I would like to share a few thoughts about the hidden risks there are when we make decisions or choose new types of technology. Technology by itself is not risky (cloud, replication, snapshots,...
View ArticleCriminal Motives Are Simple but Tactics are Crafty
The Underground Economy, Pt. 1 As underground hacking business booms, most of us have little to no visibility into what drives this "black" market in the cyber world. With this series, Symantec...
View ArticleITMS 7.5 SP1 HF1 is now available
ITMS 7.5 SP1 HF1 is available through SIM. It has the fix for the following issue:You can access the ITMS 7.5 SP1 HF1 release notes from the following location:Symantec™ IT Management Suite 7.5 SP1 HF1...
View Article[PowerShell] Monitor File System Activity
There is a Microsoft .NET Framework class library called FileSystemWatcher.This class monitors file related events like Create, Rename, Delete and run any action that you specify.Following example is...
View ArticleThink you're safe? Think again - SSL Attack Survey
This is a supplement article for SSL Ciphers - Beyond Private Key and Certificate Look! I have a lock, I see https://, I even see the Green Bar, I believe I have protected my server and the clients...
View ArticleWhat It Means to Bleed Yellow
As a Symantec alum who co-founded a startup, I’ve had the opportunity to gain a unique perspective on business by working both for a global industry leader, as well as and launching a new venture. I’m...
View ArticleFacebook Scam Leads to Nuclear Exploit Kit
Attackers have become more aggressive and are now using Facebook scams to lead to exploit kits so they can control a user’s system.続きを読む...
View ArticleApathy or Denial? Google Claims Security Unnecessary on Android Devices,...
Google's lead engineer for Android security recently announced that the majority of Android users don't need to install mobile security or antivirus, but Symantec and other security organizations have...
View ArticleAnalysts Unified Over Information Management
The recent visit of several industry analysts in the Green Park EBC created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information...
View ArticleHow does SSL work? What is an SSL handshake?
A special request was made today: "How does SSL work? What is an SSL handshake?"Here are some quick info. SSL/TLS are protocols used for encrypting information between two points. It is usually betwen...
View ArticleUpdate on Outlook versions supported on the Enterprise Vault server
Enterprise Vault’s Exchange archiving agent uses the version of MAPI supplied with Outlook to communicate with Microsoft Exchange. Enterprise Vault currently supports Outlook 2007 only due to...
View ArticleSymantec’s Green Teams present “Green Talks” - an Environmental Lecture Series
This month marks the launch of the new environmental lecture series at Symantec, Green Talks. These lectures will provide an opportunity for Symantec employees to learn about external environmental...
View ArticleSimple Motives; Crafty Tactics
Check out Part 1 of Symantec's "Underground Economy" blog series.続きを読む...
View ArticleFake US Anti-Spam Law Used in Latest Phishing Campaign
Phishers posing as banks are redirecting victims to a fake website then requesting logon credentials in order to compromise bank accounts.続きを読む...
View Article