Managing Legacy systems
I attended a webinar recently which was talking about the move from physical to virtual servers in large corporations. The analogy used was that today, approximately 70% of all servers can be...
View ArticleAndroid の「マスターキー」脆弱性の悪用例を初めて確認
デジタル署名を無効化することなく攻撃者が正規の Android アプリに悪質なコードをインジェクトできるマスターキー脆弱性が発見されたことは、今月の初めにお伝えしたとおりです。シマンテックは、悪用が容易であることから、この脆弱性がすぐに利用されるだろうと予測していましたが、残念ながらその予測のとおりになっています。ノートン モバイルインサイト(何百というマーケットプレイスから Android...
View ArticleTRIPLE ALLIANCE 2: PHYSICAL-VIRTUAL-CLOUD. PAYING FOR SHARED SERVICES
In a recent blog, I mentioned how the triple alliance of Physical, Virtual and Cloud can help you to deliver what every business strives for – maximum Service Availability at minimum cost. If you use...
View ArticleConnect Lotus Notes client to Exchange Server
Connect Lotus Notes Client to Exchange Server ConvenientlyIn order to connect Lotus Notes client to Exchange Server, there might be a number of methods ranging from manual method, via inbuilt utility,...
View ArticleNew Executive Team Members Join Symantec
Symantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team...
View ArticleDiscover Symantec Data Loss Prevention 12!
Are you ready to tap into the growing $670 million data loss prevention (DLP) market? Find out how Symantec Data Loss Protection 12 can boost your profits and enhance your credibility with new,...
View ArticleClearing out deleted mailboxes
I've been doing a lot of testing just recently with Exchange 2010 (and Archive Shuttle and Enterprise Vault). One of the things that I have needed to do is to create hundreds of mailboxes, populate...
View ArticleConnect Dev Notes: 24 July 2013
User Facing: DesktopLaunched the new 'Managing Mobility' Community.Added a new Site Help area where we can document Connect's features for new users.Fixed an issue with links to new forum comments not...
View ArticleNetBackup for SAP HANA Technical White Paper
In case anyone missed the news, with the recent release of NetBackup 7.5.0.6, one of the new features included was certified backup support for SAP HANA. We've done a lot to promote this functionality...
View ArticleWhat are the Malware and SSL Warnings in your Internet Browser?
As you search, and surf online; from time to time you may well come across a warning from your browser like the one you see below saying the site contains malware or perhaps that the connection is...
View ArticleRFID Information Can Be Stolen from Three Feet Away
Security consultant Fran Brown has created a hacking tool that can capture data from RFID badges from up to three feet away—a worrying development considering that up to 80 percent of US companies that...
View Article.pw Hit and Run Spam with Royal Baby Trend
Last month Symantec posted few blogs (here and here) on an increase in spam messages with .pw URLs.Since then the volume of URLs with .pw domains has considerably decreased. At the beginning of May the...
View Article90cm 離れていても RFID 情報の窃盗が可能に
セキュリティコンサルタントのフラン・ブラウン(Fran Brown)氏は、最大約 90cm 離れていても RFID バッジからデータを読み取れるハッキングツールを開発しました。RFID アクセス制御システムを使っている米国の企業のうち 80% 近くが、同氏にハッキングされた脆弱な技術を今でも採用していることを考えると、これは気になるニュースです。RFID とは?電波による個体識別(Radio...
View ArticleData Insight 4.0 Turns Dark Data From A Liability To A Business Asset
Last week we announced Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data,...
View ArticleBig Poker Player Loses High-Stakes Android Scam Game
Earlier this week, the Chiba Prefectural Police in Japan arrested nine individuals for distributing spam that included emails with links to download Android.Enesoluty - a malware used to collect...
View ArticleInternet Security Threat Report Readership Survey
Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...
View ArticleStaying Clear Of The Dark Side
There are deep and disturbing sides to the Internet where businesses should fear to tread, if they want to keep themselves safe. So called ‘dark’ search engines, for example, certainly need to be...
View ArticleInternet Security Threat Report Readership Survey
Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...
View ArticleWhen Car Hacking Turns Your Vehicle into a Video Game
Modern cars contain a lot of nifty electronic gadgets, as well as more than one kilometer of cable wired to all kinds of sensors, processing units, and electronic control units. The cars themselves...
View Article