Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Network Security + Endpoint Security = Better Together

Open APIs enable shared intelligence and proactive action across systems Blog Feature Image: ThinkstockPhotos-488564122.jpg Twitter カードのスタイル:  summary For too long, information security has been a...

View Article


Support Perspective and Battle Plan - W32.Disttrack / W32.Disttrack.B...

one of these days Alice, bang! zoom! straight to SHAMOON! Written by Danny WilliamsI. BACKGROUND:Symantec is currently investigating reports of another new attack in the Middle East involving the...

View Article


Support Perspective and Battle Plan - W32.Disttrack / W32.Disttrack.B...

one of these days Alice, bang! zoom! straight to SHAMOON! I. BACKGROUND:Symantec is currently investigating reports of another new attack in the Middle East involving the destructive disk-wiping...

View Article

WEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser,...

Webinar: February 7, 2017 WEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser, Independent Research Firm AnalystDATE: February 7, 2017TIME: 1:00 PM (PST) / 4:00 PM (EST)Get...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security is Vital for Nonprofits Too

How Nonprofit CASA is Protecting Children’s Personal Information with Symantec Blog Feature Image: CASA TP.png Twitter カードのスタイル:  summary Product donation is Symantec’s largest mechanism to support...

View Article


Image may be NSFW.
Clik here to view.

Shady TLD Research: .GDN and Our 2016 Wrap-up

.GooD for Nothing? Blog Feature Image: ThinkstockPhotos-590247654.jpg Twitter カードのスタイル:  summary [For those keeping score, this is the 19th in our series on Shady Top Level Domains. Links to the...

View Article

Cybersecurity Framework: Identify Function

Part four in our series on Canada's Digital Privacy Act Co-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP, ITILv3(Continued from part three in our series on Canada's Digital Privacy Act, where...

View Article

Image may be NSFW.
Clik here to view.

Android Ad Malware on Google Play Combines Three Deception Techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge.続きを読む

View Article


Image may be NSFW.
Clik here to view.

Treat Your Password Like a Toothbrush?

Symantec Employees Educate Students and Professionals to Build a Safer World Online Symantec strives to have a positive impact in the communities where we operate. Together with the Symantec...

View Article


Image may be NSFW.
Clik here to view.

Hello, SaaS! Introducing a New DLP Cloud Service for Symantec Email...

Blog Feature Image: iStock-532641809.jpgFrom phishing schemes and malware attacks to accidental and malicious data leaks, email threats are rampant, making email one of the most the most vulnerable...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Framework: Protect Function

Part five in our series on Canada's Digital Privacy Act Blog Feature Image: NIST CSF to SYMC Mapping.jpegCo-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP, ITILv3(Continued from part four in...

View Article

Image may be NSFW.
Clik here to view.

Google Play上的安卓广告恶意软件结合使用了三种骗术

Google Play上的三种应用程序利用延迟进攻、自命名诈骗,以及命令和控制服务器指定的攻击列表,在用户不知情的情况下在后台点击广告。続きを読む

View Article

Image may be NSFW.
Clik here to view.

不正な手口を 3 つ組み合わせて広告を悪用する Android マルウェアが Google Play に

時間差攻撃、自己命名機能、コマンド &コントロールサーバーによって指定される攻撃リストという 3 種類の手口を利用して、ユーザーに気付かれないままバックグラウンドでアプリをクリックするアプリが 3 つ、Google Play で公開されていました。続きを読む

View Article


Image may be NSFW.
Clik here to view.

Android ransomware repurposes old dropper techniques

Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand.続きを読む

View Article

Image may be NSFW.
Clik here to view.

安卓勒索软件改变原有病毒释放器技术的用途

安卓勒索软件利用病毒释放器技术在获取root权限的设备上释放恶意软件,并使用一种无效的二维码勒索方式进行勒索。続きを読む

View Article


Image may be NSFW.
Clik here to view.

Android を狙うランサムウェア、昔ながらのドロッパーを新たな形で再利用

ルート権限が取得されている Android デバイスを対象に、ドロッパーの手口を使ってマルウェアを投下し、2D バーコードでランサムウェアを要求するランサムウェアが登場しました。実際には、効率の悪さが露見しています。続きを読む

View Article

Image may be NSFW.
Clik here to view.

Raising our Voices against Cyberbullying

Symantec Celebrates Safer Internet Day by Uniting for a Better Internet Blog Feature Image: raiseyourvoice.png Twitter カードのスタイル:  summary Sad. Freak. Crybaby. Loser. These words all sound pretty...

View Article


Image may be NSFW.
Clik here to view.

NEW RELEASE: Symantec Advanced Threat Protection App Is Now On Splunk

Symantec recently released a newer version of Symantec™ Advanced Threat Protection (ATP). Meantime, free Symantec ATP app is now available for Splunk users Blog Feature Image: worldpoints_bluearc.jpg...

View Article

Image may be NSFW.
Clik here to view.

Symantec to Introduce Integrated Partner Program

Blog Feature Image: SecureOne Blog.jpg Twitter カードのスタイル:  summary As part of our company integration, we are bringing two separate partner programs into one rock-solid program designed to give partners...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Framework: Detect Function

Part six in our series on Canada's Digital Privacy Act Blog Feature Image: NIST CSF to SYMC Mapping.jpeg Twitter カードのスタイル:  summary Co-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP,...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>