Around BackupExec 2012
Banking, education, services, insurance, retail in addition to other industries in Lebanon are using Backup Exec 2012 to protect their data and consequently their business. It is widely used to backup...
View ArticleGoogle+: Features other social channels don’t have, and why you should try it
I know, I thought the same thing you’re probably thinking. Why should I create an account on yet another social channel? And why should I use more of my precious time figuring it out? Aren’t Facebook,...
View ArticleAre Current BC/DR Regulations, Guidelines & Best Practice Effective?
A real crisis is happening now and if we really want to reduce losses for our organization then we will need to adjust our focus. We don’t have to wait for any pandemic or catastrophe to strike;...
View ArticlePGP Whole Disk Encryption Vulnerability Claim
In the interest of transparency, incomplete information was posted on this page on Friday, January 3, 2013. As of that date, Symantec was made aware of claims about arbitrary code vulnerabilities...
View Articleマイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2013 年 1 月
今月のマイクロソフトパッチリリースブログをお届けします。 今月は、12 件の脆弱性を対象として 7 つのセキュリティ情報がリリースされています。 このうち 3...
View Article長い付き合いを求めてくる Downloader.Ponik
寄稿: Jeet Morparia出会い系サイトは大きな市場です。2012 年、アメリカでは 4,000 万人が出会い系サイトを訪問または利用しました。ある統計では、出会い系サイト業界は 10 億ドル規模になっています。別のデータによれば、全世界で 30 億ドル規模にも上ります。事実、出会い系サイトは実入りの良いビジネスなので、サイバー犯罪者の関心を引いたとしても不思議ではありません。 図 1....
View ArticleTaking Stock About Security
Yes, it’s that time of the year again, when industry analysts and commentators make their predictions about IT in general, and security in particular. We can expect all the usual – the main industry...
View ArticleeWeek agrees with Symantec: Server Security is different than Laptop Security
Why is server security different from other endpoint security? If you’re considering a solution to protect one or all of the endpoints in your environment, it's important to understand the security...
View ArticleJava Zero-Day Dished Up from Cool Exploit Kit
The use of zero-day exploits in attacks has not been too far from the headlines of late. Today, Kafeine from Malware don't need Coffee has released a blog detailing yet another Java zero-day active in...
View ArticleSave the Date: Going Virtual with Your Technology—What SMBs Need to Know
Almost every enterprise IT environment is running a virtual machine, and in recent years, small and medium-sized businesses (SMBs) have shown a strong interest in virtualization. They read about it...
View ArticleThe Password Problem: A Call for Stronger Authentication
Passwords must die.At least, that was a theme of the Gartner Identity and Access Management Conference I recently attended. And you don’t have to be a security expert to see that our traditional system...
View ArticleConnect Dev Notes: 10 Jan 2013
User Facing: DesktopCreated a new tool that gives users the ability to generate a link to a filtered list page and share that link with their teams. The tool lets you generate links to download pages,...
View ArticleCool 悪用ツールキットに利用された Java のゼロデイ脆弱性
ゼロデイ脆弱性を悪用した攻撃についてこのブログでご報告したのは、つい最近のことです。本日、ブログ「Malware don't need Coffee」の Kafeine 氏が投稿した記事によれば、現在さらに別の Java ゼロデイ攻撃が Cool...
View ArticleDavid Finn, Symantec’s Healthcare IT Officer, sits down with Bernie Monegian,...
Risk assessment today must focus on the data – not devices, in new ways due to consumerization, patient engagement and changes in the care delivery and IT delivery models. David Finn, Symantec’s...
View ArticleCreating a Gost of Windows 7 image Gost Solution Suite GSS2.5 (11.5.1.2266)
I have been trying in vain to create an image file that I can use on a range of Dell equipment (Latitude laptops, Precision and Optiplex Workstations), but to no avail.When I used XP it was easy. Build...
View ArticleCleaner Fuels Key to a Greener Future
While Symantec’s corporate mission is cyber-security, its survival depends on broader measures of safety – including the long term welfare of its employees and customers. That’s a major reason why...
View ArticlePreserving Application Customizations when installing software updates
A common issue that administrators face when managing the software update process involves situations in which:An application was originally installed with customized settings;The vendor releases an...
View ArticleHow to search for items taking up lots of space in your archive
Searching is something which I have covered in a few blog posts and articles before, but the other day when I was reading an article about how to find out which emails are taking up all your space in...
View ArticleAndroid.Exprespam Authors Revamp Gcogle Play to Android Express’s Play
When Android.Exprespam was discovered earlier this month, we quickly posted a blog warning users about the malware and discussing the details of the attack. Word spread quickly as the media, as well as...
View ArticleLegalTech Plenary 2013: Symantec Mediates the eDiscovery Debate of the Year
The eDiscovery frenzy that has gripped the American legal system over the past decade has become increasingly expensive. Particularly costly to both clients and the courts is the process of preserving...
View Article