Early Incident Detection using a Layer 8 Sensor Array
I have a calendar alert goes off at 9:30 AM to “Reach out to Layer 8”, which is a little project I devised for myself. When the reminder fires, I open a file called “Friends.txt” that contains several...
View ArticleEnhancements to Policy Based Encryption
A number of enhancements to Policy Based Encryption for Email Security.cloud are now available to improve the ease of use and extend the capabilities of Policy Based Encryption. These enhancements are...
View ArticleNetBackup Appliances 2.6.0.3 is now available!
I’m extremely happy to announce that NetBackup Appliances 2.6.0.3 is now Generally Available!NetBackup 2.6.0.3 is the latest update for NetBackup 52xx Appliances and the equivalent Appliance patch...
View ArticleHacking as a Service: How Much Does it Cost to Hack an Account?
The Underground Economy, Pt. 4 How much does hiring an underground hacker cost these days? Symantec takes a closer look at Hacking as a Service (HaaS), and why the number of hackers has boomed in...
View ArticleWin a $200 Amazon Gift Card by finishing the 3 minutes survey!
Calling all storage management and business continuity folks to participate the online influencer and user behavior survey Calling all storage management and business continuity folks! Here’s your...
View ArticleQuick way to find documents and patches for NetBackup
For some people, it might be a little bit hard to find the documents and patches for NetBackup easily and efficiently. Here provide a simple way to find them, just remember Symantec official web site...
View ArticleConfigure Flexible Storage Sharing using Veritas Operation Manager 6.1
Version 6.1 for VOM (Veritas Operation Manager) has been released recently. This new version brings management capabilities for Cluster File System and Flexible Storage Sharing (FSS) environments. In...
View ArticleTurning an Incident Response Plan into a Program
The term incident response means a lot of things to a lot of people. Historically, words like “unpleasant” or “chaotic” come to mind when thinking about the last time many organizations...
View ArticleAlongside eBay, Adidas and NIKE, Symantec Joins 70+ Businesses in Oregon in a...
Climate change has continued to become a central focus of business leaders worldwide. The US Environmental Protection Agency (EPA) recently released its proposed new emissions target for power plants,...
View ArticleJuly 2014: Most Popular Content in the Storage and Clustering Community
Check out what's trending in the community Here is some of July 2014's most viewed content in the Storage and Clustering community:Veritas disk group disabledNEW RELEASE: Introducing Storage...
View ArticleWhat Point Hotfixes are installed?
In my last post, I described the advances made with the cumulative hotfix installer and where you can find the related installation and versioning information on Enterprise Vault servers. This has...
View Article自己定量化に潜むリスク: 追跡、監視、ウェアラブルの技術
セルフトラッキングの利用者は、アプリやデバイスを通じて無数の個人情報を生成しています。このようなデータは漏えいのリスクから保護されているのでしょうか。続きを読む...
View ArticleAsprox URLViewer delivers porn adverts
The Asprox botnet adds more malicious skills to its résumé.続きを読む...
View Article1.2 billion stolen login details put a spotlight on the broken password system
Russian cybercrime group stole user names and passwords from 420,000 sites. Perhaps it’s time to move on from the password.続きを読む...
View Article1.2 bilhão de Credenciais Roubadas Colocam em Xeque o Sistema de Senhas
Grupo de cibercriminosos russos roubou nomes de usuário e senhas de 420 mil sites. Talvez seja a hora de deixar de utilizar senhas.続きを読む...
View ArticleBeyond the Nigerian Prince: Modern 419 Scams
The Underground Economy, Pt. 5 Email scams that prey on people's sympathies are often called, "419 Scams", and have continued to be an easy and inexpensive way for cyber criminals to make money. We...
View ArticleHacking for Bitcoins
The Underground Economy, Pt. 6 While Bitcoins have been a popular cryptocurrency used to protect user identity in various transactions, hackers have found ways to exploit it, through mining...
View ArticleAllSeen and All-Embracing Alliance for Symantec
Symantec is now a Community Member of the AllSeen Alliance open source consortium, a collective effort to address fundamental use cases, in order to hasten the adoption and availability of the Internet...
View ArticleEpidigitalogy:Digital Disease Control
Continuously Surveying for Digital Diseases. In todays threat landscape we stand to learn from 160 years of disease research to better prepare our security professionals to discover and prevent...
View ArticleHerramienta de espionaje apunta a gobiernos y diplomáticos: Turla
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries.続きを読む...
View Article