Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Malware Evolution: An Incident Response Perspective

Part 2: Botnet Infrastructure. Welcome to the second in our series of blog posts on malware evolution and its impact on Incident Response. In our first installment we focused on how modern malware has...

View Article


Image may be NSFW.
Clik here to view.

Symantec Operations Readiness Tools (SORT)

Esta su entorno preparado para la actualización Los fabricantes de software solemos tener por costumbre deslumbrar  periódicamente a nuestros clientes con nuevas versiones de sus productos, con nuevas...

View Article


Symantec and Hitachi partner for unstructured data governance

Today’s release of Symantec Data Insight adds data governance for Hitachi NAS Platform environments and enhances records management. Today’s release of Symantec Data Insight adds data governance for...

View Article

Image may be NSFW.
Clik here to view.

Certificate Transparency

The next change for SSL Certificates The next change for SSL CertificatesCertificate Transparency (CT) is a Google initiative to log, audit, and monitor certificates that Certificate Authorities (CAs)...

View Article

Image may be NSFW.
Clik here to view.

Avoid SSL Certificate and Clients May Avoid You

Google recently announced the https certificate update to its search algorithm, it will directly impact on your website ranking, if your website carry the SSL Certificate then you will get the “Google...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Vault Search (EVS) - Search Administrator Role

In Enterprise Vault 11.0, along with the enhanced and intuitive search UI, a lot of changes have been made at the server side to effectively administer Enterprise Vault Search (EVS). One such feature...

View Article

Image may be NSFW.
Clik here to view.

Symantec Launches Employee Volunteer Program for K-12 Schools

We can all agree that children need to be taught best practices on how to use the Internet and technology. There are many common pitfalls, and we want children to learn how to steer clear of those...

View Article

Sandworm Windows zero-day vulnerability being actively exploited in targeted...

Critical new Windows zero-day has reportedly been used in a limited number of targeted cyberespionage attacks to deliver a back door on to the victim’s computer.続きを読む...

View Article


Security vendors take action against Hidden Lynx malware

Cross-industry collaboration results in major blow against Hikit malware used by Hidden Lynx APT group.続きを読む...

View Article


Empresas de seguridad toman acciones contra el malware “Hidden Lynx”

Una operación coordinada entre Symantec y otras compañías de seguridad dio un importante golpe a Backdoor.Hikit y a otras herramientas de malware utilizadas por el grupo de ciberespionaje llamado...

View Article

Microsoft Windows TrueType Font parsing zero-day vulnerability used in...

A zero-day vulnerability affecting Microsoft Windows TrueType Font (TFF) parsing is reportedly being used to gain remote access into an international organization.続きを読む...

View Article

Microsoft Patch Tuesday – October 2014

This month the vendor is releasing eight bulletins covering a total of 24 vulnerabilities. Thirteen of this month's issues are rated ’Critical’. This month the vendor is releasing eight bulletins...

View Article

Image may be NSFW.
Clik here to view.

A Step Forward for Norton, Information Security and Information Management

I want to share my perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. I was...

View Article


Dropbox User Credentials Stolen: A Reminder To Increase Awareness In House

Over seven million Dropbox users could have had their credentials stolen by an anonymous hacker. Data breaches and online thefts like this one are happening at alarming rates. How can businesses keep...

View Article

Windows のゼロデイ脆弱性を悪用した Sandworm による標的型攻撃

限定的な標的型のサイバースパイ攻撃で、標的のコンピュータにバックドアを送り込むために Windows の新しい深刻なゼロデイ脆弱性が悪用されていると報告されています。続きを読む...

View Article


Symantec Intelligence Report: September 2014

Welcome to the September edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...

View Article

Image may be NSFW.
Clik here to view.

[PowerShell] How to use new commands introduced in EV 11

In Enterprise Vault 11.0, there are many PowerShell commands introduced.This is an introduction to how to get started.Start  “Enterprise Vault Management Shell”By default, new commands introduced in EV...

View Article


The SSL 3.0 Vulnerability – POODLE Bug (AKA POODLEbleed)

A bug has been found in the Secure Sockets Layer (SSL) 3.0 cryptography protocol (SSLv3) which could be exploited to intercept data that’s supposed to be encrypted between computers and servers. Three...

View Article

Master Server on DCS 6.0 Console

DCS console - > Admin - > Settings - View configuration 続きを読む...

View Article

Image may be NSFW.
Clik here to view.

The Sustainability Spotlight: Integrating Corporate Responsibility into...

Claudia van ’t Hullenaar brings Sustainability to Symantec’s Global Corporate Events From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>