Secure Email is getting a new look
Introducing Symantec Work Mail – the same secure email app, but with a new look and feel, streamlined workflows, and enhanced capabilities.We’ve listened to our users and completely redesigned our...
View ArticleSupport Perspective: CTB-Locker and other forms of Crypto malware
Crypto-type malware is particularly nasty to deal with because it encrypts files. While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t repairable without...
View ArticleEPM Solutions Overview - VIDEO
Adapting traditional configuration management IT operations for new end-user environments. Link to VIDEO: http://youtu.be/xy3SkOm8kIwA quick tour through some of the outstanding features of Symantec...
View ArticleLegacy BIOS Vs UEFI
System Boot Process and Partitioning Legacy BIOS Vs UEFIMore info at:https://technet.microsoft.com/en-us/library/hh825112.aspxMore info...
View ArticleTubrosa threat drives millions of views to scammers’ YouTube gaming videos
Cybercriminals are fraudulently earning advertising revenue by spreading click-fraud threat Trojan.Tubrosa, which sends compromised computers to their YouTube videos.Read More
View ArticleFacebook Sweepstakes Rules
SYMANTEC OFFICIAL RULES FOR THEBubble Wrap Appreciation Day FACEBOOK SWEEPSTAKES DRAWINGTHE BUBBLE WRAP APPRECIATION DAY FACEBOOK SWEEPSTAKES DRAWING IS OPEN TO LEGAL RESIDENTS OF THE 50 UNITED STATES...
View ArticleProteção do console e da conta de jogos
Os consoles de jogos atuais são computadores independentes, mas que ainda não são suscetíveis ao malware. Embora os consoles ainda sejam resistentes ao malware, há outros meios de acesso que os...
View ArticleConsejos para proteger consolas y cuentas de juegos en línea
Las consolas de juegos actuales son equipos independientes, pero aún no son tan vulnerables a software malicioso como las computadoras, sin embargo, los cibercriminales han creado formas para robar...
View ArticleCyberWar Games Improves Security by Allowing Symantec Employees to Think Like...
There’s no better way to learn something than by doing. With this in mind, Symantec created CyberWar Games, an innovative approach to understanding the cyber threats our customers face every day by...
View ArticleUnconfirmed zero-day vulnerability discovered in Adobe Flash Player
An unconfirmed zero-day vulnerability in Adobe Flash Player is being used by the Angler exploit kit to install malware.Read More
View ArticleDescubren vulnerabilidad de día cero no confirmada en Adobe Flash Player
Esta vulnerabilidad está siendo utilizada por el Kit exploit Angler para instalar software malicioso.Read More
View ArticleAdobe Flash Player に未確認のゼロデイ脆弱性
Adobe Flash Player で見つかった未確認のゼロデイ脆弱性が、Angler 悪用キットによってマルウェアをインストールするために悪用されています。Read More
View ArticleEnterprise Vault Search (EVS) – New Features in 11.0.1
The new look of Enterprise Vault Search (EVS) has received lots of positive feedback and appreciation from the EV customers and partners. To keep the ball rolling more user friendly features have been...
View ArticleEnterprise Vault Search (EVS) – Startup Location
In EV11.0.1 Enterprise Vault Search allows end user to set a startup location in the user preferences. With this feature you can directly access your favorite folder without navigating or going through...
View ArticleScarab attackers took aim at select Russian targets since 2012
The Scarab attack group has been distributing back door threats, Trojan.Scieron and Trojan.Scieron.B, to Russian-speaking individuals both inside and outside of Russia.Read More
View ArticleSymantec Inspiring Future Cybersecurity Professionals at the TeenTech City...
Last month London’s The Copper Box Arena at the Olympic Park transformed into a city of science and technology exploration for students. TeenTech organizes events across England and Ireland to inspire...
View ArticleLead with an Information Security Story
Lead with a story to inspire & engage your audience... Lead with an Information Security Story to inspire & engage your audience in conversation and explore:1: Why IS?: threats, pressures...
View ArticleLead with an Information Management Story
Lead with a story to inspire & engage your audience... Lead with an Information Management Story to inspire & engage your audience in conversation and explore:1: Why IM?: threats, pressures...
View ArticleSnapshot (156) Errors when no snapshots are being taken
Twitter カードのスタイル: summary I have been working with NetBackup since 6.5 as a consultant and from time to time I have seen flat file windows backups fail with 156 errors, which is a snapshot failure. A...
View ArticleAndroid in the Enterprise Part 3 – Protecting Against Malicious and Risky Apps
In our first two posts in this series, we discussed the challenges of Android in the enterprise and provided tips to help secure Android to enable its adoption. In this post, we’ll dive into the...
View Article