標的型攻撃の増加と、企業を守る方法
標的型攻撃は、現代のセキュリティインフラストラクチャが直面している、特に厄介で難しい脅威です。シマンテックは、2013 年に標的型攻撃の件数が 91% も増加したことを確認しています。ここでは、標的型攻撃の詳細と、すぐに実行できる対策についてお伝えします。...
View ArticleExplore the why, how, what & when of Information Insight & Governance
How to solve bigger customer problems and grow your business in partnership with Veritas Explore the why, how, what and when of Information Insight & Governance in this series of Veritas Sales...
View Article"How-to" Webcast Series - Ghost Solution Suite 3.0 - June 3rd Recording
Today was a good day! In conjunction with the general availability of Ghost Solution Suite 3.0, we held the third in our series of "How-to" webcasts to help our customers get up to speed on this...
View ArticleSymantec Presentations on OpenStack Liberty Summit in Vancouver
Symantec team has just returned from another terrific experience of OpenStack summit - this time in Vancouver. Check out our awesome SYMC talks on YouTube: 続きを読む
View Article情報セキュリティ - 転ばぬ先の杖
情報セキュリティ意識について、従業員のトレーニングを実施しましょう オンラインでの企業の安全対策は、コンピュータとネットワークの安全対策に従業員も関与するところから始まります。 情報セキュリティとは、常に構築と強化の段階を続けていくプロセスです。セキュリティは過程であって目的地ではありません。情報セキュリティのプロセスには多くの戦術と活動がありますが、いずれも大きく言うと予防、検出、対応の 3...
View Article日本語によるワンクリック詐欺、OTA で配布された悪質なアプリで iOS ユーザーを標的に
日本語のワンクリック詐欺が iOS にも広がりました。アダルト動画サイトを介して悪質なアプリを配布し、会員料金を請求してきます。続きを読む
View Article11.0.1 Cumulative Hotfix 2 release
Hi Everyone,This week we dropped the latest cumulative hotfix release on the Enterprise Vault 11.0.1 version! 11.0.1 CHF2 is now available - head this way for more details and the...
View ArticleTask control? There's an app for that…
Another day, another issue from a different era….Enterprise Vault comes with a little utility to control services and tasks, called EVService.exe. You can find it in the install folder, typically...
View ArticleMac vulnerability could provide persistent and stealthy access
Symantec confirms flaw allows attackers to install rootkit malware that could survive hard disk reformat.続きを読む
View Article新たな暗号化ランサムウェア「Locker」で 169 ドルしか稼げなかった作成者が謝罪か
Locker の作成者は、被害者のコンピュータに暗号化を仕掛けたことについて後悔している様子を見せ、ファイルを自動的に復号しています。続きを読む
View ArticleMac に密かな永続ルートアクセスを許す脆弱性
シマンテックは、攻撃者がルートキットマルウェアをインストールでき、ハードディスクを再フォーマットしても残る脆弱性を確認しました。続きを読む
View ArticleIt’s World Environment Day! ‘Seven Billion Dreams. One Planet. Consume with...
Will you Share your Dream? Every June 5th we celebrate World Environment Day, a day that celebrates the environment and our capacity to contribute to the well-being of our planet. This year’s theme,...
View ArticlePittsburgh Security & Compliance User Group Meeting Announcement
July 1st, 2015 Twitter カードのスタイル: summary Please join us for the Pittsburgh Security & Compliance User Group meeting in July! Agenda and details are below.You may sign up here.AGENDAWelcome &...
View ArticleMay 2015: Most Popular Content in the Storage and Clustering Community
Check out what's trending in the community続きを読む
View ArticleStrange Looking Attachments After Archiving
Have you ever had the situation where an email with attachments just looks 'odd' after it has been archived? I know I have. It doesn't normally happen on environments that I have had direct dealings...
View ArticleCloud Archiving Services for Microsoft Lync®
Veritas™ Enterprise Vault.cloud announces native support for on-premise Microsoft Lync® archiving — enabling organization’s to meet compliance, eDiscovery, and storage management requirements....
View ArticlePoweliks click-fraud malware goes fileless in attempt to prevent removal
Prolific click-fraud bot, Trojan.Poweliks, resides only in the Windows registry and uses several tricks to make it difficult to evict.続きを読む
View ArticleMicrosoft Patch Tuesday – June 2015
This month the vendor is releasing eight bulletins covering a total of 45 vulnerabilities. Twenty of this month's issues are rated ’Critical’.続きを読む
View ArticleCelebrating Pride at Symantec
Alan Turing (1912-1952), a British computer scientist and cryptographer, once said “We can only see a short distance ahead, but we can see plenty there that needs to be done.” This encompasses our...
View Articleワンクリック詐欺マルウェアの Poweliks、ファイルの形をとらずに除去を回避
ワンクリック詐欺のボットネットを蔓延させる Trojan.Poweliks は、Windows レジストリにのみ存在し、いくつもの手口を使うため、排除が困難です。続きを読む
View Article