Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

母親やアニメファン、ゲーマーなども狙う Android.Uracto

Android.Uractoという悪質なアプリが、感染を広げる目的で、あるいはユーザーを欺いて、ありもしないサービスの利用料金を支払わせようとしてスパム SMS メッセージを送信していることは、1...

View Article


Image may be NSFW.
Clik here to view.

Pope Themed Spam Attacks Lead to Malware

Contributor: Saurabh FarkadeThe Vatican City has been in the news a lot in the past few weeks due to Benedict XVI’s resignation and the election of Pope Francis. Spammers have picked up on this...

View Article


Exchange Server on Trial at Symantec Vision – What?!!

Vision Las Vegas 2013 will offer a wonderful opportunity for you to catch up on all things Symantec. During the many breakout sessions, we will educate you on various aspects of the Symantec product...

View Article

Exchange Server on Trial at Symantec Vision – What?!!

Vision Las Vegas 2013 will offer a wonderful opportunity for you to catch up on all things Symantec. During the many breakout sessions, we will educate you on various aspects of the Symantec product...

View Article

Silicon Valley Tests Its Cyber Readiness at Symantec Competition

Symantec brought its Cyber Readiness Challenge to the Silicon Valley on March 13, 2013 where more than 50 participants gathered at the Computer History Museum (how appropriate!) to engage in the...

View Article


Need Help Understanding Solid State Performance?

Although solid-state continues to be touted as a way to address storage bottlenecks for running performance-intensive applications, enterprises are struggling with how to implement the technology in an...

View Article

Image may be NSFW.
Clik here to view.

The New Black: Facebook Black Scam Spreads on Facebook

Yesterday, Facebook users may have noticed an influx of their friends posting about something called Facebook Black. Figure 1. Facebook photo plugging “Faecbook” Black (notice the typo in this image)...

View Article

Office 2010 Packaging Guide For the Training on 3/19/13

Hi all,Just posting a PDF that's an updated packaging guide for Office 2010.  This guide covers dealing with the Lincesing Services in office and how to remove them from a layer and capturing one as...

View Article


Image may be NSFW.
Clik here to view.

How to exclude wildcard filenames from Enterprise Vault FSA

 There are many organisations that want to implement File System Archiving, and each and everyone seems to have an odd request that they want to see accomplished during the evaluation of their...

View Article


It's 2013 For Goodness Sakes!

You know, it’s 2013 and we still have this issue of employees believing that corporate data is their own to do with as they please. In a recent Ponemon survey report ~two thirds of employees believe...

View Article

Image may be NSFW.
Clik here to view.

Blackhole Exploit Kit Takes Advantage of Cypriot Financial Crisis

In recent days, the European Union (EU) financial crisis has taken a dramatic turn. Cyprus, one of the EU's smallest member states by population, announced plans to impose a one-off levy of up to 10...

View Article

South Korean Banks and Broadcasting Organizations Suffer Major Damage from...

It has been reported in the media that several South Korean banks and local broadcasting organizations have been impacted by a cyber attack.The attack included the defacement of a Korean ISP/telecoms...

View Article

Image may be NSFW.
Clik here to view.

TeamSpy: Backdoor to the Viewer

Today, the Laboratory of Cryptography and System Security (Crysys) at Budapest University of Technology and Economics, released their research ­around a targeted attack they have identified, named...

View Article


March 20 Workspace Virtualization & Streaming Webcast - Recording

Thanks to all who attended today's Webcast focused on "How to Virtualize Microsoft Office".Special thanks to Jordan Sanderson for his great presentation! Slides from today's webcast are attached to...

View Article

Image may be NSFW.
Clik here to view.

Remote Linux Wiper Found in South Korean Cyber Attack

Earlier today we published our initial findings about the attacks on South Korean banks and local broadcasting organizations. We have now discovered an additional component used in this attack that is...

View Article


Image may be NSFW.
Clik here to view.

黒の流行にご注意: Facebook Black 詐欺の被害が拡大中

Facebook をお使いであれば、3 月 19 日頃、Facebook Black というアプリについて友達からの投稿が増えたことに気づかれたかもしれません。 図 1. Facebook の写真用プラグイン「Faecbook Black」(タイプミスがあることに注意) これまでの詐欺と同様、ユーザーがタグ付けされた写真に、外部 Web...

View Article

Endpoint Management Future is Secure

Good news from Symantec CEO Steve Bennett has arrived in the form of a Customer and Partner letter.The important bit for us is that Endpoint Management is explictly listed as being a critical part of...

View Article


Protecting Reputation, Business and Customers in Today’s Extended Vendor...

By Cheryl Tang, Senior Product Marketing Manager, Symantec Corp.In today’s global economy, it’s no secret that many organizations rely on third parties for critical business activities. While...

View Article

Image may be NSFW.
Clik here to view.

Turning BYOD to your advantage?

Consumerisation of information technology is forcing IT to take a new look at security. And, if you run a small to mid-sized company, with limited resources, it’s adding pressure.. With social media...

View Article

Image may be NSFW.
Clik here to view.

Indian Websites Pursued by Phishers

Contributor: Ayub KhanSymantec has been constantly monitoring phishing sites hosted on compromised Indian websites. In 2011, our study detailed these compromised sites and we did a similar study of...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>