5 Oportunidades para el Canal en 2013
Ahora que comienza el año, aprovechamos para reunir las opiniones de nuestro equipo acerca de la evolución que el escenario tecnológico ha tenido en los últimos 12 meses, especialmente en aspectos como...
View ArticleWindows 8 Security Is No Magic Bullet
Microsoft’s latest desktop operating system release has been applauded as the most secure Windows ever – incorporating features including anti-malware out of the box, boot protection against rootkits...
View ArticleWaledac Gets Cozy with Virut
Recently, we blogged about the file-infector virus known as W32.Virut and the botnet’s return to distributing new payloads. In the blog, we estimated that the Virut botnet currently consists of 308,000...
View ArticleRecruiting Security Experts Worldwide
Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy."The Symantec Cyber Readiness Challenge is a competition designed for all levels of technical...
View ArticleMeaningful Use Stage 3 Request for Comments response
I just submitted comments to HHS ONC related to Privacy and Security questions. We'll leave Objectives & Measures; Recommended Objectives; and Quality Measures to those experts.
View ArticleVisit Symantec Booth #1411 @ HIMSS 2013
Symantec at HIMSS 2013! http://www.symantec.com/page.jsp?id=himss-2013&header=0&depthpath=0
View ArticleAndroid.Exprespam の作成者グループ、Gcogle Play から「ANDROID EXPRESS の PLAY」にリニューアル
Android.Exprespamを発見した今月初め、シマンテックはただちにこのマルウェアについて警告するブログを公開し、この攻撃の詳細について説明しました。時をおかずにメディアや警察当局もこれを広く伝えたため、情報は瞬く間に広がりました。詐欺師たちも、この報道が十分に浸透し、マルウェアと偽のマーケットを更新する機が熟したと判断したのか、コンテンツを一新してまた新たな攻撃を始めています。新しい偽マー...
View ArticleJava の最新のゼロデイ脆弱性に対する追加の保護対策
シマンテックセキュリティレスポンスは先日のブログで、Java のゼロデイ脆弱性を狙った攻撃が Cool 悪用ツールキットによって拡散され、活動中であることをご報告しました。Cool 悪用ツールキットのほかに、Blackhole、Redkit、Impact...
View ArticleScript pour migrer les agents Altiris de 6.0 vers 7.1
Bonjour à tous et bonne année 2013...La version 6 d'Altiris arrive en fin de vie Mars cette Année. Pour ceux qui utilisent "Patch Solution" et n'ont pas encore migré: Nous avons déjà validé avec...
View ArticleGUI interface for RoboCopy
RichCopy is a GUI interface for RoboCopy tool. This tool was originally developed in 1996 by Microsoft for internal use only but later they made it available for free public download. An interesting...
View ArticleSymantec Intelligence Report: December 2012
In December’s Symantec Intelligence Report we take a closer look at our worldwide stats on the threat landscape. For the month of December, the United States claimed the dubious honor of being the...
View ArticleThe license was entered, why is Backup Exec 2012 still in trial mode?
There are 3 ways Backup Exec 2012 can be licensed:A. import a Symantec License File (SLF) 1. From the “Add Licenses” screen, click Import From File. 2. Browse to the location where to you saved the...
View ArticleSymantec Puts Altiris Unit on the Block
http://blogs.wsj.com/deals/2013/01/15/symantec-put... By Anupreeta Das and Sharon TerlepSecurity software company Symantec Corp. SYMC -0.19% has put Altiris Inc., a business it acquired for about $800...
View ArticleSymantec and Informatica: Better Together for Unstructured and Structured...
Data volumes are exploding. We see it all around us. The problem is that too much data can have a very negative impact on user productivity. Think about how long it takes to sift through emails after...
View ArticleWhat is a Placeholder?
It is a term that many people in Enterprise Vault will know about. It is used in Enterprise Vault File System Archiving, but even if you don't use FSA then you may still know what it is. Essentially...
View ArticleSymantec Protections for Red October
An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear...
View ArticleProtección de Symantec para Octubre Rojo (Red October)
Una avanzada red de ciberespionaje dirigida a organizaciones de alto perfil y gobiernos ha sido recientemente descubierta. El método de ataque principal que se utiliza en esta campaña es lo que...
View ArticleJoin Symantec at the Light Reading SDN Symposium - The Future of...
The traditional network architecture for carriers is under a fundamental change to meet the requirements of today's enterprises and end users. Industry standards that are aimed at simplifying and...
View ArticleTroubleshoot method for offline clients
There are many reason for the client offline status. Below are the some reason with resolution1. Systems are in unmanage...
View ArticleCustomer Success: Hillsborough County Public Schools Endpoint Protection
Over the last 10 years, Hillsborough County Public Schools (HCPS) in Southwestern Florida saw an influx in the use of technology in schools. With over 267 school sites and more than 85,000 endpoints,...
View Article