Malware Evolution: An Incident Response Perspective
Part 2: Botnet Infrastructure. Welcome to the second in our series of blog posts on malware evolution and its impact on Incident Response. In our first installment we focused on how modern malware has...
View ArticleSymantec Operations Readiness Tools (SORT)
Esta su entorno preparado para la actualización Los fabricantes de software solemos tener por costumbre deslumbrar periódicamente a nuestros clientes con nuevas versiones de sus productos, con nuevas...
View ArticleSymantec and Hitachi partner for unstructured data governance
Today’s release of Symantec Data Insight adds data governance for Hitachi NAS Platform environments and enhances records management. Today’s release of Symantec Data Insight adds data governance for...
View ArticleCertificate Transparency
The next change for SSL Certificates The next change for SSL CertificatesCertificate Transparency (CT) is a Google initiative to log, audit, and monitor certificates that Certificate Authorities (CAs)...
View ArticleAvoid SSL Certificate and Clients May Avoid You
Google recently announced the https certificate update to its search algorithm, it will directly impact on your website ranking, if your website carry the SSL Certificate then you will get the “Google...
View ArticleEnterprise Vault Search (EVS) - Search Administrator Role
In Enterprise Vault 11.0, along with the enhanced and intuitive search UI, a lot of changes have been made at the server side to effectively administer Enterprise Vault Search (EVS). One such feature...
View ArticleSymantec Launches Employee Volunteer Program for K-12 Schools
We can all agree that children need to be taught best practices on how to use the Internet and technology. There are many common pitfalls, and we want children to learn how to steer clear of those...
View ArticleSandworm Windows zero-day vulnerability being actively exploited in targeted...
Critical new Windows zero-day has reportedly been used in a limited number of targeted cyberespionage attacks to deliver a back door on to the victim’s computer.続きを読む...
View ArticleSecurity vendors take action against Hidden Lynx malware
Cross-industry collaboration results in major blow against Hikit malware used by Hidden Lynx APT group.続きを読む...
View ArticleEmpresas de seguridad toman acciones contra el malware “Hidden Lynx”
Una operación coordinada entre Symantec y otras compañías de seguridad dio un importante golpe a Backdoor.Hikit y a otras herramientas de malware utilizadas por el grupo de ciberespionaje llamado...
View ArticleMicrosoft Windows TrueType Font parsing zero-day vulnerability used in...
A zero-day vulnerability affecting Microsoft Windows TrueType Font (TFF) parsing is reportedly being used to gain remote access into an international organization.続きを読む...
View ArticleMicrosoft Patch Tuesday – October 2014
This month the vendor is releasing eight bulletins covering a total of 24 vulnerabilities. Thirteen of this month's issues are rated ’Critical’. This month the vendor is releasing eight bulletins...
View ArticleA Step Forward for Norton, Information Security and Information Management
I want to share my perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. I was...
View ArticleDropbox User Credentials Stolen: A Reminder To Increase Awareness In House
Over seven million Dropbox users could have had their credentials stolen by an anonymous hacker. Data breaches and online thefts like this one are happening at alarming rates. How can businesses keep...
View ArticleWindows のゼロデイ脆弱性を悪用した Sandworm による標的型攻撃
限定的な標的型のサイバースパイ攻撃で、標的のコンピュータにバックドアを送り込むために Windows の新しい深刻なゼロデイ脆弱性が悪用されていると報告されています。続きを読む...
View ArticleSymantec Intelligence Report: September 2014
Welcome to the September edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...
View Article[PowerShell] How to use new commands introduced in EV 11
In Enterprise Vault 11.0, there are many PowerShell commands introduced.This is an introduction to how to get started.Start “Enterprise Vault Management Shell”By default, new commands introduced in EV...
View ArticleThe SSL 3.0 Vulnerability – POODLE Bug (AKA POODLEbleed)
A bug has been found in the Secure Sockets Layer (SSL) 3.0 cryptography protocol (SSLv3) which could be exploited to intercept data that’s supposed to be encrypted between computers and servers. Three...
View ArticleMaster Server on DCS 6.0 Console
DCS console - > Admin - > Settings - View configuration 続きを読む...
View ArticleThe Sustainability Spotlight: Integrating Corporate Responsibility into...
Claudia van ’t Hullenaar brings Sustainability to Symantec’s Global Corporate Events From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability...
View Article