Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Secure Email is getting a new look

Introducing Symantec Work Mail – the same secure email app, but with a new look and feel, streamlined workflows, and enhanced capabilities.We’ve listened to our users and completely redesigned our...

View Article


Image may be NSFW.
Clik here to view.

Support Perspective: CTB-Locker and other forms of Crypto malware

Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t repairable without...

View Article


Image may be NSFW.
Clik here to view.

EPM Solutions Overview - VIDEO

Adapting traditional configuration management IT operations for new end-user environments. Link to VIDEO: http://youtu.be/xy3SkOm8kIwA quick tour through some of the outstanding features of Symantec...

View Article

Image may be NSFW.
Clik here to view.

Legacy BIOS Vs UEFI

System Boot Process and Partitioning Legacy BIOS Vs UEFIMore info at:https://technet.microsoft.com/en-us/library/hh825112.aspxMore info...

View Article

Image may be NSFW.
Clik here to view.

Tubrosa threat drives millions of views to scammers’ YouTube gaming videos

Cybercriminals are fraudulently earning advertising revenue by spreading click-fraud threat Trojan.Tubrosa, which sends compromised computers to their YouTube videos.Read More

View Article


Facebook Sweepstakes Rules

SYMANTEC OFFICIAL RULES FOR THEBubble Wrap Appreciation Day FACEBOOK SWEEPSTAKES DRAWINGTHE BUBBLE WRAP APPRECIATION DAY FACEBOOK SWEEPSTAKES DRAWING IS OPEN TO LEGAL RESIDENTS OF THE 50 UNITED STATES...

View Article

Proteção do console e da conta de jogos

Os consoles de jogos atuais são computadores independentes, mas que ainda não são suscetíveis ao malware. Embora os consoles ainda sejam resistentes ao malware, há outros meios de acesso que os...

View Article

Consejos para proteger consolas y cuentas de juegos en línea

Las consolas de juegos actuales son equipos independientes, pero aún no son tan vulnerables a software malicioso como las computadoras, sin embargo, los cibercriminales han creado formas para robar...

View Article


Image may be NSFW.
Clik here to view.

CyberWar Games Improves Security by Allowing Symantec Employees to Think Like...

There’s no better way to learn something than by doing. With this in mind, Symantec created CyberWar Games, an innovative approach to understanding the cyber threats our customers face every day by...

View Article


Image may be NSFW.
Clik here to view.

Unconfirmed zero-day vulnerability discovered in Adobe Flash Player

An unconfirmed zero-day vulnerability in Adobe Flash Player is being used by the Angler exploit kit to install malware.Read More

View Article

Image may be NSFW.
Clik here to view.

Descubren vulnerabilidad de día cero no confirmada en Adobe Flash Player

Esta vulnerabilidad está siendo utilizada por el Kit exploit Angler para instalar software malicioso.Read More

View Article

Image may be NSFW.
Clik here to view.

Adobe Flash Player に未確認のゼロデイ脆弱性

Adobe Flash Player で見つかった未確認のゼロデイ脆弱性が、Angler 悪用キットによってマルウェアをインストールするために悪用されています。Read More

View Article

Enterprise Vault Search (EVS) – New Features in 11.0.1

The new look of Enterprise Vault Search (EVS) has received lots of positive feedback and appreciation from the EV customers and partners. To keep the ball rolling more user friendly features have been...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Vault Search (EVS) – Startup Location

In EV11.0.1 Enterprise Vault Search allows end user to set a startup location in the user preferences. With this feature you can directly access your favorite folder without navigating or going through...

View Article

Image may be NSFW.
Clik here to view.

Scarab attackers took aim at select Russian targets since 2012

The Scarab attack group has been distributing back door threats, Trojan.Scieron and Trojan.Scieron.B, to Russian-speaking individuals both inside and outside of Russia.Read More

View Article


Image may be NSFW.
Clik here to view.

Symantec Inspiring Future Cybersecurity Professionals at the TeenTech City...

Last month London’s The Copper Box Arena at the Olympic Park transformed into a city of science and technology exploration for students. TeenTech organizes events across England and Ireland to inspire...

View Article

Image may be NSFW.
Clik here to view.

Lead with an Information Security Story

Lead with a story to inspire & engage your audience... Lead with an Information Security Story to inspire & engage your audience in conversation and explore:1: Why IS?: threats, pressures...

View Article


Image may be NSFW.
Clik here to view.

Lead with an Information Management Story

Lead with a story to inspire & engage your audience... Lead with an Information Management Story to inspire & engage your audience in conversation and explore:1: Why IM?: threats, pressures...

View Article

Snapshot (156) Errors when no snapshots are being taken

Twitter カードのスタイル:  summary I have been working with NetBackup since 6.5 as a consultant and from time to time I have seen flat file windows backups fail with 156 errors, which is a snapshot failure. A...

View Article

Image may be NSFW.
Clik here to view.

Android in the Enterprise Part 3 – Protecting Against Malicious and Risky Apps

In our first two posts in this series, we discussed the challenges of Android in the enterprise and provided tips to help secure Android to enable its adoption. In this post, we’ll dive into the...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>