Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Minimizing our waste streams - Symantec's first global waste audit

This month, Symantec is celebrating Earth Day by exploring our commitment to environmental responsibility. Previous posts have explored Symantec's commitment to LEED certification, and talked about our...

View Article


2012 Threats in Review - Part 1

The landscapeThis year’s Internet Security Threat Report is very sober reading for SMBs. Last year, targeted attacks on small companies (fewer than 2,500 employees) went up 50%. Yes, it's true:...

View Article


Image may be NSFW.
Clik here to view.

PSTDisableGrow and exporting archives from Enterprise Vault

 Have you ever had trouble exporting archives from Enterprise Vault? I did the other day, and it was all down to PSTDisableGrow!  Yes, that's right, PSTDisableGrow - again. What was happening was that...

View Article

Image may be NSFW.
Clik here to view.

モバイル詐欺: 心当たりのない当選金

モバイルデバイスを対象にしたスパムメッセージについては以前のブログでもお伝えしました。昨年、電子メールによるスパムは前年比 66% にまで減少しましたが、逆にモバイルスパムは、それほどの大流行ではないまでも、しだいに広がりを見せつつあります。現在、中央ヨーロッパで出回っているのは、「当選券」タイプのスパムです。筆者の知人も、わずか数日間で 8...

View Article

2013 年版『インターネットセキュリティ脅威レポート』で、サイバー犯罪者の戦術の変化が明らかに

2013 年版の『インターネットセキュリティ脅威レポート』では、世界 157 の国や地域から 6,900 万件を超える攻撃の検出情報をまとめ、脅威を取り巻く現状を明らかにしています。今回のレポートでは、標的型攻撃や小規模企業に対する攻撃の増加に加えて、新たな脅威も続々と登場していることを報告しています。標的型攻撃、ハックティビズム、情報漏えい標的型攻撃は 2012 年に 42...

View Article


Backup Exec™ Management Plug-in for Kaseya® Out Now!

I am pleased to announce that the Backup Exec™ Management Plug-in for Kaseya® version 1.1 SP1 is out now! This plug-in enables Kaseya users to remotely monitor the Backup Exec servers from within the...

View Article

Image may be NSFW.
Clik here to view.

Celebrate Earth Day with the Symantec community!

Today is Earth Day and the start of National Volunteer Week in the United States. Symantec is celebrating by exploring our commitment to environmental responsibility. Previous posts have explored...

View Article

SMP 7.1 filters with less than (

I created a filter in SMP based on software inventory and when I named the filter I had a less than sign in the name (<) and this caused this filter and another filter with a similar name to not...

View Article


Image may be NSFW.
Clik here to view.

Telugu Movies Continue to be Fraudster’s Favorites

Contributor: Avdhoot PatilPromotion for Telugu movies has gained momentum in the world of phishing as they continue to be targeted with phishing scams. The phishing site featuring the movie...

View Article


What is OCSP?

The Online Certificate Status Protocol (OCSP) is the protocol used by browsers to obtain the revocation status of a digital certificate attached to a website. Naturally OCSP speed is considered one of...

View Article

Image may be NSFW.
Clik here to view.

2013 First Quarter Zero-Day Vulnerabilities

In the first quarter of 2013, we spotted quite a few zero-day vulnerabilities affecting Oracle Java, Adobe Flash, Adobe Reader, and Microsoft Internet Explorer being exploited in the wild. This blog...

View Article

Great, free seminar from Adept-tec

 Adept-tec and Symantec are partnering for a great free seminar coverings lots of great information relating to Symantec Enterprise Vault. Symantec will be talking about: What's new in EV 10.0.4 What's...

View Article

Image may be NSFW.
Clik here to view.

2013 年第 1 四半期に確認されたゼロデイ脆弱性

2013 年第 1 四半期には、Oracle Java、Adobe Flash、Adobe Reader、および Microsoft Internet Explorer に影響するゼロデイ脆弱性が悪用されているケースが多数確認されました。このブログでは、2013 年第 1 四半期にマルウェアの拡散に悪用されたこれらのゼロデイ脆弱性について詳しく説明します。 Java のゼロデイ脆弱性シマンテックでは...

View Article


英国政府、中小規模企業のセキュリティ強化に補助金を支給

英国の中小規模企業には、サイバーセキュリティ強化のために最大 5,000 ポンド(およそ 76 万円)の補助金が支給されるようになります。政府の技術戦略委員会(Technology Strategy Board)が実施しているこの Innovation Vouchers...

View Article

Something we can all feel good about

This week marks National Volunteer Week in the United States, an opportunity to focus attention on the impact and power of volunteerism and service as an integral aspect of civic leadership. Today, CEO...

View Article


Image may be NSFW.
Clik here to view.

Something we can all feel good about

We spend a lot of time talking about our company goals, offerings, marketing and sales, and the Symantec 4.0 transition. As a global company with employees in more than 50 countries, we have the unique...

View Article

Java Exploit CVE-2013-2423 Coverage

Java vulnerabilities have always been popular among cybercriminals (exploit kits authors) since they can work across multiple browsers and even multiple operating systems, the potential for infecting...

View Article


Image may be NSFW.
Clik here to view.

Phishers Campaign for More Votes Against Syrian Regime

Contributor: Avdhoot PatilPhishers are not letting go of the chaos in Syria. They are using a common phishing template and modifying the messages. In March, phishers mimicked the same website of an...

View Article

Symantec Internet Security Threat Report Reveals Increase in Cyberespionage

2013 Internet Security Threat Report, Volume 18The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec...

View Article

Image may be NSFW.
Clik here to view.

Survey: Despite Security Incidents, BYOD Worth The Risks

When it comes to mobile, BYOD is definitely here to stay. But, is it worth the risk?This year at Symantec Vision we wanted to better understand our customers’ perceptions of how personally owned mobile...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>