Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Early Incident Detection using a Layer 8 Sensor Array

I have a calendar alert goes off at 9:30 AM to “Reach out to Layer 8”, which is a little project I devised for myself. When the reminder fires, I open a file called “Friends.txt” that contains several...

View Article


Enhancements to Policy Based Encryption

A number of enhancements to Policy Based Encryption for Email Security.cloud are now available to improve the ease of use and extend the capabilities of Policy Based Encryption. These enhancements are...

View Article


NetBackup Appliances 2.6.0.3 is now available!

I’m extremely happy to announce that NetBackup Appliances 2.6.0.3 is now Generally Available!NetBackup 2.6.0.3 is the latest update for NetBackup 52xx Appliances and the equivalent Appliance patch...

View Article

Hacking as a Service: How Much Does it Cost to Hack an Account?

The Underground Economy, Pt. 4 How much does hiring an underground hacker cost these days? Symantec takes a closer look at Hacking as a Service (HaaS), and why the number of hackers has boomed in...

View Article

Win a $200 Amazon Gift Card by finishing the 3 minutes survey!

Calling all storage management and business continuity folks to participate the online influencer and user behavior survey Calling all storage management and business continuity folks! Here’s your...

View Article


Image may be NSFW.
Clik here to view.

Quick way to find documents and patches for NetBackup

For some people, it might be a little bit hard to find the documents and patches for NetBackup easily and efficiently. Here provide a simple way to find them, just remember Symantec official web site...

View Article

Image may be NSFW.
Clik here to view.

Configure Flexible Storage Sharing using Veritas Operation Manager 6.1

Version 6.1 for VOM (Veritas Operation Manager) has been released recently. This new version brings management capabilities for Cluster File System and Flexible Storage Sharing (FSS) environments. In...

View Article

Image may be NSFW.
Clik here to view.

Turning an Incident Response Plan into a Program

         The term incident response means a lot of things to a lot of people. Historically, words like “unpleasant” or “chaotic” come to mind when thinking about the last time many organizations...

View Article


Alongside eBay, Adidas and NIKE, Symantec Joins 70+ Businesses in Oregon in a...

Climate change has continued to become a central focus of business leaders worldwide.  The US Environmental Protection Agency (EPA) recently released its proposed new emissions target for power plants,...

View Article


July 2014: Most Popular Content in the Storage and Clustering Community

Check out what's trending in the community Here is some of July 2014's most viewed content in the Storage and Clustering community:Veritas disk group disabledNEW RELEASE: Introducing Storage...

View Article

Image may be NSFW.
Clik here to view.

What Point Hotfixes are installed?

In my last post, I described the advances made with the cumulative hotfix installer and where you can find the related installation and versioning information on Enterprise Vault servers. This has...

View Article

自己定量化に潜むリスク: 追跡、監視、ウェアラブルの技術

セルフトラッキングの利用者は、アプリやデバイスを通じて無数の個人情報を生成しています。このようなデータは漏えいのリスクから保護されているのでしょうか。続きを読む...

View Article

Asprox URLViewer delivers porn adverts

The Asprox botnet adds more malicious skills to its résumé.続きを読む...

View Article


1.2 billion stolen login details put a spotlight on the broken password system

Russian cybercrime group stole user names and passwords from 420,000 sites. Perhaps it’s time to move on from the password.続きを読む...

View Article

1.2 bilhão de Credenciais Roubadas Colocam em Xeque o Sistema de Senhas

Grupo de cibercriminosos russos roubou nomes de usuário e senhas de 420 mil sites. Talvez seja a hora de deixar de utilizar senhas.続きを読む...

View Article


Beyond the Nigerian Prince: Modern 419 Scams

The Underground Economy, Pt. 5 Email scams that prey on people's sympathies are often called, "419 Scams", and have continued to be an easy and inexpensive way for cyber criminals to make money. We...

View Article

Hacking for Bitcoins

The Underground Economy, Pt. 6 While Bitcoins have been a popular cryptocurrency used to protect user identity in various transactions, hackers have found ways to exploit it, through mining...

View Article


AllSeen and All-Embracing Alliance for Symantec

Symantec is now a Community Member of the AllSeen Alliance open source consortium, a collective effort to address fundamental use cases, in order to hasten the adoption and availability of the Internet...

View Article

Epidigitalogy:Digital Disease Control

Continuously Surveying for Digital Diseases. In todays threat landscape we stand to learn from 160 years of disease research to better prepare our security professionals to discover and prevent...

View Article

Herramienta de espionaje apunta a gobiernos y diplomáticos: Turla

Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries.続きを読む...

View Article
Browsing all 5094 articles
Browse latest View live