Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

One-click fraudsters extend reach by learning Chinese

Latest scam campaign localizes content to target users in Hong Kong.続きを読む

View Article


Website Security Threat Report is Here

The first part of the WSTR 2015 is finally available, and dedicates a chapter to 2014 vulnerabilities and how they have changed our vision of threat response. Twitter カードのスタイル:  summary The first part...

View Article


Image may be NSFW.
Clik here to view.

Website Attackers Move to the Cloud While Malware Attacks Fall - Website...

Twitter カードのスタイル:  summary This post uses information taken from the Symantec Website Security Threat Report 2014 Part One.2014 saw a change in tactics for those attempting to attack websites and...

View Article

Announcing End of Life for Symantec Endpoint Protection Small Business...

Twitter カードのスタイル:  summary In an effort to optimize our small business portfolio, Symantec has End of Life’d (EOL) Symantec Endpoint Protection Small Business Edition 12.1 as of May 4, 2015.  We have...

View Article

Image may be NSFW.
Clik here to view.

Breaking Bad-themed 'Los Pollos Hermanos' crypto ransomware found in the wild

Crypto ransomware affecting Australian computers uses Breaking Bad theme in ransom demand.続きを読む

View Article


Image may be NSFW.
Clik here to view.

Outlook Versions on the Enterprise Vault Server - Again

For a long time Outlook has been used on Enterprise Vault servers to perform various activities relating to archiving. More specifically the underlying MAPI libraries are used. For many years the...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday – May 2015

This month the vendor is releasing 13 bulletins covering a total of 46 vulnerabilities. Twenty-one of this month's issues are rated ’Critical’.続きを読む

View Article

Impersonation phishing scam on Yahoo highlights importance of two-step...

Yahoo Mail accounts and address books used in family "emergency" impersonation scam.続きを読む

View Article


Image may be NSFW.
Clik here to view.

SQL 2008 - 2012 Query Optimizer Trace Flag 4199 - Increase performance

Our team came across a great blog on TechnologyMountain.com written by Benjamin Pierce about SQL Query Optimizer being disabled in 2008 sp1 and up. Once we turned this on our large query speeds have...

View Article


Symantec™ Endpoint Protection is now on Microsoft® Azure™

We are excited to announce that Symantec Endpoint Protection now protects the Microsoft Azure platform Twitter カードのスタイル:  summary To reduce costs and increase business agility, you may consider...

View Article

Image may be NSFW.
Clik here to view.

VENOM vulnerability could expose virtual machines on unpatched host systems

The VENOM vulnerability (CVE-2015-3456) could expose VMs to unauthorized access and data theft. But is it really “bigger than Heartbleed?”続きを読む

View Article

Image may be NSFW.
Clik here to view.

ServiceDesk Report Issue with Google Chrome

Hello,There was a compatibility issue with Google Chrome browser to display Symantec Service Desk report version 7.1. The reports are not displayed completely because the option to expand when grouped...

View Article

Image may be NSFW.
Clik here to view.

中国語版で攻撃範囲を拡大するワンクリック詐欺

コンテンツをローカライズして香港のユーザーを狙う詐欺が出現しています。続きを読む

View Article


End of life - Small Business Edition 12.1.x Edition

Hello Everyone,The Endpoint Protection Small Business Edition 12.1.x product has reached End-of-life and is set to be replaced by the Hosted (or .Cloud) version of the product.Note: This does NOT mean...

View Article

Image may be NSFW.
Clik here to view.

Creating Opportunities in STEM with TeenForce

Youth unemployment is at a shocking 12.3 percent - double the national unemployment rate – and has remained at a high rate over the past couple years despite falling national unemployment rates. Youth...

View Article


Image may be NSFW.
Clik here to view.

Community, Security, Liberty

Without Community, Without Security, there will never be Liberty続きを読む

View Article

Vulnerabilities in Mobile Apps

Twitter カードのスタイル:  summary Recently, we read about lots of SSL/TLS-related vulnerabilities found in mobile apps, which should come as no surprise. We were warned about this back in 2012 (see my...

View Article


Image may be NSFW.
Clik here to view.

Securing Telecommunications with Encryption

Twitter カードのスタイル:  summary I know you have been waiting for this and it’s finally here!  May 17th is Voice Telecommunication day! One of the most common subjects raised, year after year, is how do we...

View Article

Image may be NSFW.
Clik here to view.

Using Data Center Security: Server Advanced to Stay Safe from VENOM

On Wednesday, May 13, Crowdstrike researchers revealed a new zero-day vulnerability affecting a variety of virtualization platforms and cloud services. Dubbed VENOM, it allows attackers to break out of...

View Article

Image may be NSFW.
Clik here to view.

Using Data Center Security: Server Advanced to Stay Safe from VENOM

On Wednesday, May 13, Crowdstrike researchers revealed a new zero-day vulnerability affecting a variety of virtualization platforms and cloud services. Dubbed VENOM, it allows attackers to break out of...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>