Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Epidigitalogy: Digital Disease Control (Part III)

Following in Dr. John Snow's Footsteps Following in Dr. Snow’s footsteps     We can follow Dr. Snow’s lead by looking for commonalities, differences and outliers in our own digital communities. We...

View Article


It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our...

View Article


The Market for Online Credentials

The Underground Economy, Pt. 10 Online credentials are a hot ticket in the underground economy. 1.2 billion were stolen just this month by a Russian crime ring. So, how do these hackers cash in on...

View Article

Russian cybercrime team - another reason to use VIP

If anyone needed another reason to be wary of using solely passwords to protect their accounts, the recent report of the Russian cybercrime team that stole 1.2 billion usernames and passwords from...

View Article

It’s a New World, It’s a New Norton

Fran Rosch, EVP Norton Business Unit The original blog is posted on Information Unleashed.The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions...

View Article


Is Cyber Security A Political Issue? Yes!

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally...

View Article

Image may be NSFW.
Clik here to view.

Resolving Microsoft Add-ins Issues

OfficeIns from NirSoft is a portable freeware utility that lists all the Microsoft Office add-ins present on your computer. This tool is useful in case of issues with Microsoft Office add-ins ( i.e....

View Article

Image may be NSFW.
Clik here to view.

The Human-Ocean Connection

What My 31 days Spent Underwater Means to Me and to You For those who don’t know me, my name is Fabien Cousteau, and I am an oceanic explorer, conservationist, and leader of Mission 31. My grandfather...

View Article


Image may be NSFW.
Clik here to view.

Vote for Symantec Mobility: Suite for a CTIA MobITS Award

Symantec Mobility: Suite is a finalist in the 2014 CTIA Awards MobITS program, Mobile Security & Privacy category. Vote for Symantec by clicking here. This link will bring you to our entry page...

View Article


Phishers serve up Paolo Bediones sex video, steal Facebook user logins

A fake Facebook website is behind a phishing campaign offering up the sex scandal video of Filipino TV host Paolo Bediones.続きを読む...

View Article

Does my Enterprise Vault Archive look 'big'?

One of the questions which comes up is whether or not to rollover archives in Enterprise Vault. End user archives typically don't get that big, usually a few Gb. File System Archives, Public Folder...

View Article

Looking for CSP Resident in Raleigh, NC

We are looking to hire a CSP resident in the Raleigh, NC area.  The req can be found at:http://www.symantec.com/about/careers/careers.jsp?areq=%2021145BRPlease contact Ryan Alves at...

View Article

Protecting Your Virtual Network

Virtual data centers are helping businesses become more productive and agile in today's changing world, but they are susceptible to cyber attacks. What is the best course of action to protect and...

View Article


What’s New in the Spam Market?

The Underground Economy, Pt. 11 Spam has been around for years, clogging up email folders with "junk" mail with links that lead to scam websites, or a download of malicious code. But the spam market...

View Article

Our Cheat Sheet for Keystone (OpenStack) Resources

I have been asked these questions quite often now:What is the best resource for understanding Keystone Overview?Are there any blog posts showcasing some of the key functionalities of Keystone?Do we...

View Article


MS14-045 and MSWU-1010, Broken Updates and Patch Automation

A Quick Fix As suggested by the title I recently had a problem with MS revoking updates. It seems simple enough, but even though those updates are marked as disabled in the Altiris Database, the...

View Article

European automobile businesses fall prey to Carbon Grabber

Cybercriminals target automotive companies in the UK, the Netherlands, Germany, and Italy with Infostealer.Retgate.続きを読む...

View Article


Image may be NSFW.
Clik here to view.

Epidigitalogy: Digital Disease Control (Part IV)

Leveraging Waiting Room Time Leveraging Waiting Room Time     Organizations can continue to rely solely on their security vendors to provide the miracle drug or antidote for the digital disease...

View Article

Countering the security risks from third party mobile apps

Mobile apps continue to pose a major security headache for organizations; NIST offers some advice on how to tackle the issues.続きを読む...

View Article

Backoff Trojan Is Back: Protect Your Business From The Next POS Breach

The Point of Sale malware, trojan.backoff has been reported to have affected more businesses than was originally determined by the Department of Homeland Security. Find out the best way to protect your...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>