Get ready for a new Symantec University for Partners
Easier to use. Easier to learn. Twitter カードのスタイル: summary Beginning June 10, 2016, partners will have access to a new and improved Symantec University. In preparation for this improvement, Symantec...
View ArticleIntended and Unintended Consequences of Innovation
Symantec CTO Darren Thomson shares his thoughts on innovation Blog Feature Image: Innovation_Blog_v2_2.png Twitter カードのスタイル: summary The technology we build today is impressive, but compared to what...
View Articleプライバシー、情報の一部非公開(Name Redaction)とCertificate Transparency
Blog Feature Image: bluelock.jpg証明書を公開ログに記録することにはメリットがある一方、顧客の多くには、プライベートと見なしている内部ドメイン名をログに残したくないという需要があります。そのメリットと需要の両立が重要だということを、筆者の前回のブログでお伝えしました。(IETF)Internet Engineering Task Force...
View ArticleSymantec Participation in and Support for the Department of Defense (DoD)...
Twitter カードのスタイル: summary Symantec participates in and supports the Department of Defense (DoD) Coalition of Apple Engineers (CAE). The DoD CAE is an initiative to bring together engineers throughout...
View ArticleHow to really protect connected things
There’s no doubt that the IoT improves our lives in countless ways, whether that be through the use of connected cars, smart cities, consumer electronics or medical devices, for example. These...
View ArticleSymantec Endpoint Encryption: protect sensitive data on endpoint devices
There are few organizations not acutely aware of the massive number of data breaches that are occurring all around them – whether that be within an enterprise just down the block from them or one on...
View Article隱私、修訂與憑證透明度
Blog Feature Image: bluelock.jpg我在上一篇部落格文章中曾討論在公開憑證登錄的好處和多數客戶的需求之間必須取得平衡,才可避免登錄客戶視為保密的內部網域名稱。網際網路工程任務小組 (Internet Engineering Task Force) 亦體悟其重要性,已經不斷在改善憑證透明度 (CT)...
View ArticleAndroid malware finds new ways to derive current running tasks
Android banking and ad-fraud Trojans leverage ideas found in GitHub-hosted open source projects and use the UsageStats API to bypass Android 5.0 and 6.0 security enhancements.続きを読む
View Article実行中のタスクを検出する新しい手口―Android マルウェアの飽くなき追求
金融機関を狙う Android マルウェアや偽広告を使うトロイの木馬が、GitHub で公開されているオープンソースのプロジェクトをヒントに、UsageStats API を使って Android 5.0/6.0 のセキュリティ機能をくぐり抜けています。続きを読む
View Article安卓恶意软件寻找获知系统当前运行任务的新方法
安卓银行木马和广告诈骗木马采用GitHub托管开源项目中的理念并结合使用UsageStats API,以躲避安卓5.0和6.0安全增强功能检测。続きを読む
View ArticleThe Many Faces of Pride - Celebrating LGBT Pride Month 2016
June marks Pride Month where millions of people come together across the world to celebrate the LGBT community – to applaud the progress that has been made and to bring awareness to the struggles that...
View ArticleExtending the Security of Office 365: User Authentication
Last installment in a series on the benefits Symantec Office 365 Protection While your organization uses Office 365 for more productivity with the cloud, are you sure the right people—and only the...
View ArticleNew Symantec Email Quarantine for Email Security.cloud
Replacement of Spam Manager Starting soon, Symantec Email Security.cloud users will begin migrating to our new Email Quarantine. The new end-user portal includes a number of improvements and new...
View ArticleFake gaming torrents lead to potentially unwanted applications
PUA downloaders are disguising themselves as torrents for pirated copies of Assassin’s Creed Syndicate and The Witcher 3 to install multiple different PUAs on users’ computers.続きを読む
View ArticleNow Take That! Over 900 Employees Give Back Through Symantec's Take 5 Global...
Twitter カードのスタイル: summary Last April, Symantec launched Take 5, a global volunteering program that challenged employees across Symantec to offer five hours of service to make a positive impact in the...
View Article虚假游戏种子文件导致用户安装潜在不受欢迎应用程序
潜在不受欢迎应用程序(PUA)下载器伪装成盗版《刺客信条:辛迪加》和《巫师3》的种子文件,在用户电脑上安装多种不同的PUA。続きを読む
View ArticleISTR Insights: Cyber Threats and the Healthcare Industry
A look at the current threat landscape affecting the healthcare industry Twitter カードのスタイル: summary The healthcare industry is going digital with massive amounts of patient data stored and shared...
View Article人気ゲームを騙って、潜在的に迷惑なアプリケーションをインストールする偽の Torrent
『アサシン クリード シンジケート』や『ウィッチャー3 ワイルドハント』などの海賊版コンテンツの Torrent ファイルに偽装して、複数の PUA をインストールしようとする PUA(潜在的に迷惑なアプリケーション)ダウンローダが確認されました。続きを読む
View ArticleLatest Intelligence for May 2016
Our latest intelligence reveals Angler responsible for over 51 percent of exploit kit attacks, and one email in every 134 is now malicious.続きを読む
View Article