Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

5 Oportunidades para el Canal en 2013

Ahora que comienza el año, aprovechamos para reunir las opiniones de nuestro equipo acerca de la evolución que el escenario tecnológico ha tenido en los últimos 12 meses, especialmente en aspectos como...

View Article


Windows 8 Security Is No Magic Bullet

Microsoft’s latest desktop operating system release has been applauded as the most secure Windows ever – incorporating features including anti-malware out of the box, boot protection against rootkits...

View Article


Image may be NSFW.
Clik here to view.

Waledac Gets Cozy with Virut

Recently, we blogged about the file-infector virus known as W32.Virut and the botnet’s return to distributing new payloads. In the blog, we estimated that the Virut botnet currently consists of 308,000...

View Article

Image may be NSFW.
Clik here to view.

Recruiting Security Experts Worldwide

Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy."The Symantec Cyber Readiness Challenge is a competition designed for all levels of technical...

View Article

Meaningful Use Stage 3 Request for Comments response

I just submitted comments to HHS ONC related to Privacy and Security questions.  We'll leave Objectives & Measures; Recommended Objectives; and Quality Measures to those experts.    

View Article


Visit Symantec Booth #1411 @ HIMSS 2013

Symantec at HIMSS 2013!   http://www.symantec.com/page.jsp?id=himss-2013&header=0&depthpath=0  

View Article

Image may be NSFW.
Clik here to view.

Android.Exprespam の作成者グループ、Gcogle Play から「ANDROID EXPRESS の PLAY」にリニューアル

Android.Exprespamを発見した今月初め、シマンテックはただちにこのマルウェアについて警告するブログを公開し、この攻撃の詳細について説明しました。時をおかずにメディアや警察当局もこれを広く伝えたため、情報は瞬く間に広がりました。詐欺師たちも、この報道が十分に浸透し、マルウェアと偽のマーケットを更新する機が熟したと判断したのか、コンテンツを一新してまた新たな攻撃を始めています。新しい偽マー...

View Article

Image may be NSFW.
Clik here to view.

Java の最新のゼロデイ脆弱性に対する追加の保護対策

シマンテックセキュリティレスポンスは先日のブログで、Java のゼロデイ脆弱性を狙った攻撃が Cool 悪用ツールキットによって拡散され、活動中であることをご報告しました。Cool 悪用ツールキットのほかに、Blackhole、Redkit、Impact...

View Article


Image may be NSFW.
Clik here to view.

Script pour migrer les agents Altiris de 6.0 vers 7.1

Bonjour à tous et bonne année 2013...La version 6 d'Altiris arrive en fin de vie Mars cette Année. Pour ceux qui utilisent "Patch Solution" et n'ont pas encore migré: Nous avons déjà validé avec...

View Article


GUI interface for RoboCopy

RichCopy is a GUI interface for RoboCopy tool. This tool was originally developed in 1996 by Microsoft for internal use only but later they made it available for free public download.  An interesting...

View Article

Symantec Intelligence Report: December 2012

In December’s Symantec Intelligence Report we take a closer look at our worldwide stats on the threat landscape. For the month of December, the United States claimed the dubious honor of being the...

View Article

Image may be NSFW.
Clik here to view.

The license was entered, why is Backup Exec 2012 still in trial mode?

There are 3 ways Backup Exec 2012 can be licensed:A. import a Symantec License File (SLF) 1. From the “Add Licenses” screen, click Import From File. 2. Browse to the location where to you saved the...

View Article

Symantec Puts Altiris Unit on the Block

http://blogs.wsj.com/deals/2013/01/15/symantec-put... By Anupreeta Das and Sharon TerlepSecurity software company Symantec Corp. SYMC -0.19% has put Altiris Inc., a business it acquired for about $800...

View Article


Symantec and Informatica: Better Together for Unstructured and Structured...

Data volumes are exploding.  We see it all around us. The problem is that too much data can have a very negative impact on user productivity. Think about how long it takes to sift through emails after...

View Article

Image may be NSFW.
Clik here to view.

What is a Placeholder?

 It is a term that many people in Enterprise Vault will know about.  It is used in Enterprise Vault File System Archiving, but even if you don't use FSA then you may still know what it is.  Essentially...

View Article


Image may be NSFW.
Clik here to view.

Symantec Protections for Red October

An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear...

View Article

Image may be NSFW.
Clik here to view.

Protección de Symantec para Octubre Rojo (Red October)

Una avanzada red de ciberespionaje dirigida a organizaciones de alto perfil y gobiernos ha sido recientemente descubierta. El método de ataque principal que se utiliza en esta campaña es lo que...

View Article


Join Symantec at the Light Reading SDN Symposium - The Future of...

The traditional network architecture for carriers is under a fundamental change to meet the requirements of today's enterprises and end users. Industry standards that are aimed at simplifying and...

View Article

Troubleshoot method for offline clients

There are many reason for the client offline status. Below are the some reason with resolution1. Systems are in unmanage...

View Article

Customer Success: Hillsborough County Public Schools Endpoint Protection

Over the last 10 years, Hillsborough County Public Schools (HCPS) in Southwestern Florida saw an influx in the use of technology in schools. With over 267 school sites and more than 85,000 endpoints,...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>