Netbackup integration with cloud
cloud based backup Hello Folks\experts\system admins,Since past year there is lot of information related to backup software and cloud integration. Cloud technology from different vendors like...
View ArticleAndroid ransomware: Tricks of the trade
A look at some of the detection-evasion and anti-analysis tactics employed by Android ransomware.続きを読む
View ArticleSundown exploit kit adds Internet Explorer exploit before any other kit
The Sundown exploit kit has been the first to integrate an exploit for the CVE 2015-2444 bug, using it in a recent watering-hole attack.続きを読む
View ArticleBeing Alive To ‘Dead’ Data – And Enriching The Business
Most organisations already have more information than they can handle and the rate at which this is expanding is staggering – yet many are struggling to understand exactly what that data is, and how to...
View ArticleAndroid を狙うランサムウェア: その攻略法を知る
Android を狙うランサムウェアは、検出をすり抜け解析を回避する手口を使っています。その一部をご紹介します。続きを読む
View ArticlePoised for growth – Corporate Responsibility at Symantec
Vote Now! We’re giving away a $10,000 grant to one of our nonprofit partners, and you tell us where it goes! Just visit our stakeholder feedback survey and answer a few, very brief questions about the...
View ArticleSymantec Endpoint Protection Small Business Edition: Top Support Topic
Get access to the right help for Symantec Endpoint Protection Small Business Edition installation questions One of the top support calls we receive is around failed installations of Endpoint...
View ArticleSundown 悪用ツールキット、他のツールキットに先んじて Internet Explorer の悪用コードを統合
Sundown 悪用ツールキットは、CVE 2015-2444 の脆弱性に対する悪用コードをいち早く統合し、最近の水飲み場型攻撃に利用しています。続きを読む
View ArticleeDiscovery Platform 8.1 Troubleshooting eLearning now available
eDiscovery Platform 8.1 Troubleshooting eLearning The Symantec Technical Education team is pleased to announce the availability of 8 new training modules for the eDiscovery Platform version 8.1...
View ArticleTroubleshooting Enterprise Vault for SharePoint?
Often we get asked how to troubleshoot Enterprise Vault for SharePoint issues, so here is a little bit of information. A good starting point is to check:How to check that the Enterprise Vault...
View ArticleRegin: Further unravelling the mysteries of a cyberespionage threat
Symantec’s investigation uncovers additional modules for the Regin spying tool and finds advanced infrastructure supporting it.続きを読む
View ArticleCR Summer Events in England
What did you do this summer?For most people, summer is their favorite season of the year. And why not – it means long sun-filled days, barbeques and picnics in the park, and holiday time. This summer,...
View ArticleScammers quick to capitalize on Ashley Madison breach
Symantec telemetry shows surge in spam messages mentioning Ashley Madison megabreach.続きを読む
View ArticleRegin: 謎の多いサイバースパイツール、解明が進む
シマンテックの調査で、Regin スパイツールのモジュールが新たに発見され、それを支える高度なインフラストラクチャも明らかになってきました。続きを読む
View Article早くも詐欺師の金儲けに利用されたアシュレイ・マディソンのデータ漏えい
アシュレイ・マディソンの大規模なデータ漏えいをネタにしたスパムメールの急増が、シマンテックの遠隔測定で確認されています。続きを読む
View ArticleEnterprise Vault.cloud: Office 365 Primer
Office 365 FUD #1 As Microsoft continues with their aggressive proliferation of Office 365, we need to have a good grasp of what we are up against. I will have a series of emails that will explore...
View ArticleUnited Kingdom Backup & Archiving User Group Update
Twitter カードのスタイル: summary There have been a number of things happen recently in the NetBackup world, here is a summary of some of them. NetBackup 7.7 NetBackup 7.7 was released on 7th July and...
View ArticleTop Five Keys of Information Security Incident Response
Security Response Top Five Keys of Information Security Incident Response are:Virus or Malicious Code OutbreakPhysical Incident or Data LossNetwork Base Deniel of ServiceInformation Data BreachInsider...
View ArticleJailbreak iOS Trojan KeyRaider used as part of free apps scam
Attackers claim to offer premium apps to iOS devices for free by using stolen Apple ID accounts.続きを読む
View ArticleAgentless Threat Protection with Symantec Data Center Security 6.6
Comprehensive, Always-On Antimalware and Threat Protection for Your VMware Environments As software defined data centers grow more complex, security becomes more important – and tougher to implement....
View Article