Poodle: Vulnerability in old version of SSL represents new threat
New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure connections. New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure...
View ArticleDockerized Builds
Dockerizing build environment! How can we use docker and extend to our build environment ? What is the benefit of doing so ? This article discusses on the use of docker to create images for our build...
View Articleセキュリティベンダーの共同作戦で Hidden Lynx のマルウェアに打撃
業界横断的な共同作戦により、Hidden Lynx APT グループによって利用されている Hikit マルウェアに大きな打撃を与えました。続きを読む...
View ArticleNetwork tool for Windows
PingHurry is a nice that allows to run ping and trace route tools in a graph window ( flat or 3D view ), it accepts IP addresses and host names.If your job requires to do connectivity checks several...
View ArticleDropbox users targeted by phishing scam hosted on Dropbox
Fake Dropbox login page attempts to steal credentials for popular email services. Fake Dropbox login page attempts to steal credentials for popular email services.続きを読む...
View ArticleRSS reader for Windows : FeedDemon
FeedDemon is a nice RSS reader for Windows, I find it helpful to stay informed with my favorites websites. A nice tool to have on your computer...Features:Tagging - Assign your own keywords to items,...
View ArticlePoodle: 古いバージョンの SSL の脆弱性がもたらす新しい脅威
SSL 3.0 の新しい脆弱性により、安全なはずの接続から攻撃者がデータを盗み出す可能性があります。 SSL 3.0 の新しい脆弱性により、安全なはずの接続から攻撃者がデータを盗み出す可能性があります。続きを読む...
View ArticlePDF invoices may cost more than you expect
Misspelled invoice email claims to be looking for payment but steals confidential information instead. Misspelled invoice email claims to be looking for payment but steals confidential information...
View ArticleWhat updates (service packs and hotfixes) are released for Backup Exec 2014...
The following table shows the hotfixes which were released for Backup Exec 2014 version. All the hotfixes in Italicare not anymore available on LiveUpdate, because they were replaced by further Service...
View ArticleDirty Topic Tweet Chat 10/30 – Securing Mobile Devices In The Workplace
What’s more important: securing mobile devices or enabling employee access? Personal device usage is a chronic challenge in organizations today. In the U.S., 52% of employees use their smartphones to...
View ArticleAgile, End-to-end, Scalable Data Protection for Cisco UCS Based Data Centers...
Better Backup for Cisco UCS Data Centers Whether you are deploying UCS with your own choices of storage or consuming it as part of popular converged infrastructure solutions like NetApp FlexPod or VCE...
View ArticleDenial-of-service attacks—short but strong
DDoS amplification attacks continue to increase as attackers experiment with new protocols. DDoS amplification attacks continue to increase as attackers experiment with new protocols.続きを読む...
View ArticleVLAN tagging in Netbackup Appliance
There is no clear documentation available about how to create multiple VLAN ip address to assign to single interface in multi VLAN network. I am trying to summarize the steps to perform the same.続きを読む...
View ArticleVideo: Fake IRS Phone and Phishing Scams, How to Know
Over 90,000 people in the United States have filed complaints about scammers posing to be from the IRS and demanding that they pay taxes. It is estimated that these scams have cost taxpayers millions...
View ArticleOctober Product Release Update
Earlier this month, Rick Kramer, our new Vice President of Channel Sales for North America, shared a number of important updates with partners regarding the latest product releases, the fact that our...
View Article“Good security is good marriage”
Report from Day 1 of the FDA Workshop on Medical Device Security The title is probably a good quote to reflect the spirit of the first day of the public workshop on “Collaborative Approaches for...
View ArticleSymantec Information Management Connect Day
Site con videos de las ponencias ¿No pudiste asistir al evento IM Connect Day en Madrid?, ya esta disponible todo el contenido, con videos de todas las ponencias aqui:...
View ArticleAttackers circumvent patch for Windows Sandworm vulnerability
Attackers continue to take advantage of the Sandworm vulnerability by using an exploit that bypasses its patch to send compromised PowerPoint documents as email attachments.続きを読む...
View ArticleCorporate Responsibility helps Symantec win
My leadership team and I are committed to making Symantec a company that gives employees challenging and interesting work, invests in their growth, and provides them with opportunities to build...
View ArticleHow To Find Out How Many Items Are In Your Archive
The other day I had a need to find out how many archived items were in a particular archive. Normally I'd leap straight over to the Vault Store Usage Report, but for some reason (maybe the number of...
View Article