Turla: Spying tool targets governments and diplomats
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries.続きを読む...
View ArticleSymantec Endpoint Protection via CHAT, Phone Support, Email Support & Social...
Hello Everyone,Symantec Endpoint Protection support is availalble with multiple options like Phone Support, Chat Support, Email Support & Social support.Here is the landing page:...
View ArticleZero-Day Hit Close to Home
Patch Available for Symantec Endpoint Protection 11.x and 12.1 The prevalence of zero-day vulnerabilities hit close to home this week when a North American penetration tester published a report...
View ArticleInterns Volunteer Over 100 Hours During Symantec Intern Volunteer Week 2014
Similar to Symantec's Volunteer of the Quarter initiative, which highlights and rewards employees who dedicate their time and talents to those in need, our University Relations Team hosts an Intern...
View ArticleCloud-enabled Management Webcast Recording - August 6, 2014
Thanks to all those who attended our webcast on Cloud-enabled management! Slides used during the webcast are included with this blog post (scroll down to the bottom)FREE 1 hour assessment from...
View ArticleEpidigitalogy: Digital Disease Control (Part II)
Origins of Modern Epidemiology Origin of Modern Epidemiology続きを読む...
View ArticleQuickly see the Enterprise Vault Hidden Messages with Outlook Spy
Sometimes checking the Hidden Messages which Enterprise Vault users to store policy and desktop settings is necessary. Sometimes it’s just to validate that the messages are there, sometimes it’s to...
View ArticlePhishing Post Mega Breach: How The Loss of PII is Only the Start of Your...
The Underground Economy Series, Pt. 7 2013 was declared "The Year of The Mega Breach" by Symantec researchers, but what happens to personal information once it's stolen, and how can users protect...
View ArticleRenting a Zombie Farm: Botnets and the Hacker Economy
The Underground Economy, Pt. 8 The most recent major data breach stealing 1.2 billion usernames and passwords was orchestrated using a botnet, a robot network of "zombie" computers, which, by being...
View ArticleNew Data Protection for Email Security.cloud is here
As more customers move to cloud-based solutions for email and web, flexible data protection capabilities become critical. To address this, Symantec has upgraded the Content Control add-on for Email...
View Articleログイン情報の大量盗難によって注目される新たなパスワードシステム
ロシアのサイバー犯罪者集団が 42 万カ所の Web サイトからユーザー名とパスワードを盗み取りました。パスワード以外の認証方法に目を向けるべき時かもしれません。続きを読む...
View ArticleBoolean Operators in Enterprise Vault 11 Search
The new search interface delivered in Enterprise Vault 11 is a big step forward in look, feel, and functionality over the older versions. It of course relies on Enterprise Vault 11 on the back-end, in...
View ArticleSymantec Desktop Laptop Option 7.6 is now available!
I am really excited to announce that Symantec Desktop Laptop Option (DLO) 7.6 is generally available! What’s New in DLO 7.6?This release is based on the theme Proliferation, Stability and...
View ArticleCustomised Shortcuts and Outlook AutoPreview
An interesting issue came my way last week. One of the problems with a large product like Enterprise Vault is the sheer number of nooks and crannies that customers, and indeed engineers, might not...
View ArticleSymantec's four pillars and the stages of a zero-day attack
Of all the types of security threat faced by businesses today, perhaps the most ominous are 'zero-day attacks’, so-called because when they strike, no known or comprehensive solution exists to counter...
View ArticleTypes of SSL certificates – choose the right one
IntroductionFrom the server administrators of highly technological organizations, to product managers of financial institutions, down to the one man startup companies that just want to secure their...
View ArticleMobile Attacks: Cybercriminals' New Cash Cow
The Underground Economy, Pt. 9 With more connected devices out there, hackers can reach people's information anyplace, anywhere. We look into the various schemes and techniques the cyber criminals use...
View ArticleMeet the Engineers - Asmita Joshi
I started working with Symantec in mid of 2011. I joined EV engineering team in Pune, India. During my 3 yrs. tenure, I mostly work on PST Migration Enhancements feature.PST Migration enhancements...
View ArticleGetting inside the new PST Migration Enhancements - Part 1
The PST Problem?Despite the existence of many viable data archiving solutions, PST files continue to exist and increase with users. Many existing Enterprise Vault customers are still struggling with...
View ArticleDoes malware still detect virtual machines?
Virtual systems are not immune to malware, despite what some people may believe.続きを読む...
View Article