Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Managing Legacy systems

I attended a webinar recently which was talking about the move from physical to virtual servers in large corporations. The analogy used was that today, approximately 70% of all servers can be...

View Article


Image may be NSFW.
Clik here to view.

Android の「マスターキー」脆弱性の悪用例を初めて確認

デジタル署名を無効化することなく攻撃者が正規の Android アプリに悪質なコードをインジェクトできるマスターキー脆弱性が発見されたことは、今月の初めにお伝えしたとおりです。シマンテックは、悪用が容易であることから、この脆弱性がすぐに利用されるだろうと予測していましたが、残念ながらその予測のとおりになっています。ノートン モバイルインサイト(何百というマーケットプレイスから Android...

View Article


TRIPLE ALLIANCE 2: PHYSICAL-VIRTUAL-CLOUD. PAYING FOR SHARED SERVICES

In a recent blog, I mentioned how the triple alliance of Physical, Virtual and Cloud can help you to deliver what every business strives for – maximum Service Availability at minimum cost. If you use...

View Article

Connect Lotus Notes client to Exchange Server

Connect Lotus Notes Client to Exchange Server ConvenientlyIn order to connect Lotus Notes client to Exchange Server, there might be a number of methods ranging from manual method, via inbuilt utility,...

View Article

Image may be NSFW.
Clik here to view.

New Executive Team Members Join Symantec

Symantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team...

View Article


Discover Symantec Data Loss Prevention 12!

Are you ready to tap into the growing $670 million data loss prevention (DLP) market? Find out how Symantec Data Loss Protection 12 can boost your profits and enhance your credibility with new,...

View Article

Image may be NSFW.
Clik here to view.

Clearing out deleted mailboxes

I've been doing a lot of testing just recently with Exchange 2010 (and Archive Shuttle and Enterprise Vault).  One of the things that I have needed to do is to create hundreds of mailboxes, populate...

View Article

Connect Dev Notes: 24 July 2013

User Facing: DesktopLaunched the new 'Managing Mobility' Community.Added a new Site Help area where we can document Connect's features for new users.Fixed an issue with links to new forum comments not...

View Article


NetBackup for SAP HANA Technical White Paper

In case anyone missed the news, with the recent release of NetBackup 7.5.0.6, one of the new features included was certified backup support for SAP HANA. We've done a lot to promote this functionality...

View Article


What are the Malware and SSL Warnings in your Internet Browser?

As you search, and surf online; from time to time you may well come across a warning from your browser like the one you see below saying the site contains malware or perhaps that the connection is...

View Article

Image may be NSFW.
Clik here to view.

RFID Information Can Be Stolen from Three Feet Away

Security consultant Fran Brown has created a hacking tool that can capture data from RFID badges from up to three feet away—a worrying development considering that up to 80 percent of US companies that...

View Article

Image may be NSFW.
Clik here to view.

.pw Hit and Run Spam with Royal Baby Trend

Last month Symantec posted few blogs (here and here) on an increase in spam messages with .pw URLs.Since then the volume of URLs with .pw domains has considerably decreased. At the beginning of May the...

View Article

Image may be NSFW.
Clik here to view.

90cm 離れていても RFID 情報の窃盗が可能に

セキュリティコンサルタントのフラン・ブラウン(Fran Brown)氏は、最大約 90cm 離れていても RFID バッジからデータを読み取れるハッキングツールを開発しました。RFID アクセス制御システムを使っている米国の企業のうち 80% 近くが、同氏にハッキングされた脆弱な技術を今でも採用していることを考えると、これは気になるニュースです。RFID とは?電波による個体識別(Radio...

View Article


Image may be NSFW.
Clik here to view.

正規のオンライン翻訳サービスを使う医薬品スパム

シマンテックは過去数カ月の間に、正規の Google...

View Article

Data Insight 4.0 Turns Dark Data From A Liability To A Business Asset

Last week we announced Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data,...

View Article


Image may be NSFW.
Clik here to view.

Big Poker Player Loses High-Stakes Android Scam Game

Earlier this week, the Chiba Prefectural Police in Japan arrested nine individuals for distributing spam that included emails with links to download Android.Enesoluty - a malware used to collect...

View Article

Internet Security Threat Report Readership Survey

Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...

View Article


Staying Clear Of The Dark Side

There are deep and disturbing sides to the Internet where businesses should fear to tread, if they want to keep themselves safe. So called ‘dark’ search engines, for example, certainly need to be...

View Article

Internet Security Threat Report Readership Survey

Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...

View Article

Image may be NSFW.
Clik here to view.

When Car Hacking Turns Your Vehicle into a Video Game

 Modern cars contain a lot of nifty electronic gadgets, as well as more than one kilometer of cable wired to all kinds of sensors, processing units, and electronic control units. The cars themselves...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>