Network Security + Endpoint Security = Better Together
Open APIs enable shared intelligence and proactive action across systems Blog Feature Image: ThinkstockPhotos-488564122.jpg Twitter カードのスタイル: summary For too long, information security has been a...
View ArticleSupport Perspective and Battle Plan - W32.Disttrack / W32.Disttrack.B...
one of these days Alice, bang! zoom! straight to SHAMOON! Written by Danny WilliamsI. BACKGROUND:Symantec is currently investigating reports of another new attack in the Middle East involving the...
View ArticleSupport Perspective and Battle Plan - W32.Disttrack / W32.Disttrack.B...
one of these days Alice, bang! zoom! straight to SHAMOON! I. BACKGROUND:Symantec is currently investigating reports of another new attack in the Middle East involving the destructive disk-wiping...
View ArticleWEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser,...
Webinar: February 7, 2017 WEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser, Independent Research Firm AnalystDATE: February 7, 2017TIME: 1:00 PM (PST) / 4:00 PM (EST)Get...
View ArticleCyber Security is Vital for Nonprofits Too
How Nonprofit CASA is Protecting Children’s Personal Information with Symantec Blog Feature Image: CASA TP.png Twitter カードのスタイル: summary Product donation is Symantec’s largest mechanism to support...
View ArticleShady TLD Research: .GDN and Our 2016 Wrap-up
.GooD for Nothing? Blog Feature Image: ThinkstockPhotos-590247654.jpg Twitter カードのスタイル: summary [For those keeping score, this is the 19th in our series on Shady Top Level Domains. Links to the...
View ArticleCybersecurity Framework: Identify Function
Part four in our series on Canada's Digital Privacy Act Co-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP, ITILv3(Continued from part three in our series on Canada's Digital Privacy Act, where...
View ArticleAndroid Ad Malware on Google Play Combines Three Deception Techniques
Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge.続きを読む
View ArticleTreat Your Password Like a Toothbrush?
Symantec Employees Educate Students and Professionals to Build a Safer World Online Symantec strives to have a positive impact in the communities where we operate. Together with the Symantec...
View ArticleHello, SaaS! Introducing a New DLP Cloud Service for Symantec Email...
Blog Feature Image: iStock-532641809.jpgFrom phishing schemes and malware attacks to accidental and malicious data leaks, email threats are rampant, making email one of the most the most vulnerable...
View ArticleCybersecurity Framework: Protect Function
Part five in our series on Canada's Digital Privacy Act Blog Feature Image: NIST CSF to SYMC Mapping.jpegCo-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP, ITILv3(Continued from part four in...
View ArticleGoogle Play上的安卓广告恶意软件结合使用了三种骗术
Google Play上的三种应用程序利用延迟进攻、自命名诈骗,以及命令和控制服务器指定的攻击列表,在用户不知情的情况下在后台点击广告。続きを読む
View Article不正な手口を 3 つ組み合わせて広告を悪用する Android マルウェアが Google Play に
時間差攻撃、自己命名機能、コマンド &コントロールサーバーによって指定される攻撃リストという 3 種類の手口を利用して、ユーザーに気付かれないままバックグラウンドでアプリをクリックするアプリが 3 つ、Google Play で公開されていました。続きを読む
View ArticleAndroid ransomware repurposes old dropper techniques
Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand.続きを読む
View ArticleAndroid を狙うランサムウェア、昔ながらのドロッパーを新たな形で再利用
ルート権限が取得されている Android デバイスを対象に、ドロッパーの手口を使ってマルウェアを投下し、2D バーコードでランサムウェアを要求するランサムウェアが登場しました。実際には、効率の悪さが露見しています。続きを読む
View ArticleRaising our Voices against Cyberbullying
Symantec Celebrates Safer Internet Day by Uniting for a Better Internet Blog Feature Image: raiseyourvoice.png Twitter カードのスタイル: summary Sad. Freak. Crybaby. Loser. These words all sound pretty...
View ArticleNEW RELEASE: Symantec Advanced Threat Protection App Is Now On Splunk
Symantec recently released a newer version of Symantec™ Advanced Threat Protection (ATP). Meantime, free Symantec ATP app is now available for Splunk users Blog Feature Image: worldpoints_bluearc.jpg...
View ArticleSymantec to Introduce Integrated Partner Program
Blog Feature Image: SecureOne Blog.jpg Twitter カードのスタイル: summary As part of our company integration, we are bringing two separate partner programs into one rock-solid program designed to give partners...
View ArticleCybersecurity Framework: Detect Function
Part six in our series on Canada's Digital Privacy Act Blog Feature Image: NIST CSF to SYMC Mapping.jpeg Twitter カードのスタイル: summary Co-authored by Ken Durbin, CISSP and Kevin McPeak, CISSP,...
View Article