Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Turla: Spying tool targets governments and diplomats

Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries.続きを読む...

View Article


Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection via CHAT, Phone Support, Email Support & Social...

Hello Everyone,Symantec Endpoint Protection support is availalble with multiple options like Phone Support, Chat Support, Email Support & Social support.Here is the landing page:...

View Article


Zero-Day Hit Close to Home

Patch Available for Symantec Endpoint Protection 11.x and 12.1 The prevalence of zero-day vulnerabilities hit close to home this week when a North American penetration tester published a report...

View Article

Image may be NSFW.
Clik here to view.

Interns Volunteer Over 100 Hours During Symantec Intern Volunteer Week 2014

Similar to Symantec's Volunteer of the Quarter initiative, which highlights and rewards employees who dedicate their time and talents to those in need, our University Relations Team hosts an Intern...

View Article

Cloud-enabled Management Webcast Recording - August 6, 2014

Thanks to all those who attended our webcast on Cloud-enabled management! Slides used during the webcast are included with this blog post (scroll down to the bottom)FREE 1 hour assessment from...

View Article


Epidigitalogy: Digital Disease Control (Part II)

Origins of Modern Epidemiology Origin of Modern Epidemiology続きを読む...

View Article

Image may be NSFW.
Clik here to view.

Quickly see the Enterprise Vault Hidden Messages with Outlook Spy

Sometimes checking the Hidden Messages which Enterprise Vault users to store policy and desktop settings is necessary. Sometimes it’s just to validate that the messages are there, sometimes it’s to...

View Article

Phishing Post Mega Breach: How The Loss of PII is Only the Start of Your...

The Underground Economy Series, Pt. 7 2013 was declared "The Year of The Mega Breach" by Symantec researchers, but what happens to personal information once it's stolen, and how can users protect...

View Article


Renting a Zombie Farm: Botnets and the Hacker Economy

The Underground Economy, Pt. 8 The most recent major data breach stealing 1.2 billion usernames and passwords was orchestrated using a botnet, a robot network of "zombie" computers, which, by being...

View Article


New Data Protection for Email Security.cloud is here

As more customers move to cloud-based solutions for email and web, flexible data protection capabilities become critical. To address this, Symantec has upgraded the Content Control add-on for Email...

View Article

ログイン情報の大量盗難によって注目される新たなパスワードシステム

ロシアのサイバー犯罪者集団が 42 万カ所の Web サイトからユーザー名とパスワードを盗み取りました。パスワード以外の認証方法に目を向けるべき時かもしれません。続きを読む...

View Article

Boolean Operators in Enterprise Vault 11 Search

The new search interface delivered in Enterprise Vault 11 is a big step forward in look, feel, and functionality over the older versions. It of course relies on Enterprise Vault 11 on the back-end, in...

View Article

Symantec Desktop Laptop Option 7.6 is now available!

I am really excited to announce that Symantec Desktop Laptop Option (DLO) 7.6 is generally available! What’s New in DLO 7.6?This release is based on the theme Proliferation, Stability and...

View Article


Image may be NSFW.
Clik here to view.

Customised Shortcuts and Outlook AutoPreview

An interesting issue came my way last week.  One of the problems with a large product like Enterprise Vault is the sheer number of nooks and crannies that customers, and indeed engineers, might not...

View Article

Symantec's four pillars and the stages of a zero-day attack

Of all the types of security threat faced by businesses today, perhaps the most ominous are 'zero-day attacks’, so-called because when they strike, no known or comprehensive solution exists to counter...

View Article


Image may be NSFW.
Clik here to view.

Types of SSL certificates – choose the right one

IntroductionFrom the server administrators of highly technological organizations, to product managers of financial institutions, down to the one man startup companies that just want to secure their...

View Article

Mobile Attacks: Cybercriminals' New Cash Cow

The Underground Economy, Pt. 9 With more connected devices out there, hackers can reach people's information anyplace, anywhere. We look into the various schemes and techniques the cyber criminals use...

View Article


Meet the Engineers - Asmita Joshi

I started working with Symantec in mid of 2011. I joined EV engineering team in Pune, India. During my 3 yrs. tenure, I mostly work on PST Migration Enhancements feature.PST Migration enhancements...

View Article

Image may be NSFW.
Clik here to view.

Getting inside the new PST Migration Enhancements - Part 1

The PST Problem?Despite the existence of many viable data archiving solutions, PST files continue to exist and increase with users. Many existing Enterprise Vault customers are still struggling with...

View Article

Does malware still detect virtual machines?

Virtual systems are not immune to malware, despite what some people may believe.続きを読む...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>