Tor Anonymity Comes Under Attack
On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3...
View ArticleNorton Internet Security 2013 was ranked as one of the most accurate programs...
Dennis Technology Labs offers a range of testing services that are focussed on performance benchmarking hardware and software products.Symantec’s Norton Internet Security 2013 was ranked as one of the...
View ArticleSave the Date: Google+ Hangout – What Can the Backup Exec 3600 do to Improve...
Building a traditional backup solution can result in a high level of complexity where the processes are often too siloed and too unreliable to be trusted with your company’s most valuable asset. But,...
View ArticleSave the Date: Google+ Hangout – What Can the Backup Exec 3600 do to Improve...
Building a traditional backup solution can result in a high level of complexity where the processes are often too siloed and too unreliable to be trusted with your company’s most valuable asset. But,...
View ArticleInternet Encryption Shakeup
This article is written based on wide spread Internet reports from Black Hat Conference at Las Vegas.Recent advances in math and cryptology research in the academic field indicate that there might be...
View ArticleTor の匿名性が攻撃される
8 月 4 日、Freedom Hosting(Tor ネットワークを介して匿名ホスティングサービスを提供するサービスプロバイダ)が運用する Web サイトで、不正なスクリプトのホスティングが見つかりました。これは、Freedom Hosting の代表と見られる人物の引き渡しを米国当局が要請したことに関する、8 月 3 日のメディアレポートに続くものです。見つかったスクリプトは、Firefox...
View ArticleStock Spam: A Sign of Economic Recovery?
It may sound strange, but one surefire sign that the economy is on the mend is an increase in stock spam. Yes, stock spam is a bellwether signal of an economic revival and if you want proof, check your...
View ArticleConnect Dev Notes: 07 August 2013
Updates deployed to the Connect production servers as a result of the code sprint that ended 06 August 2013.User Facing: DesktopAdded [brackets] around group names when they appear in the subject lines...
View ArticleSymantec’s Cecily Joseph Featured in Triple Pundit’s Women in CSR Column
Triple Pundit, one of the leading media platforms that reports on corporate responsibility and sustainability news, has featured Symantec’s Senior Director of Corporate Responsibility, Cecily Joseph,...
View ArticleHIPAA Compliance For Cloud Data
Understanding HIPAA ComplianceThe Health Insurance Portability and Accountability Act (HIPAA) applies to any healthcare provider, health plan, and clearing house that electronically maintains or...
View ArticleSpotting Fake Email and SMS Messages
One of the most persistent security issues for mobile and web users is phishing - that’s when thieves try to fool you into giving away your personal data. Fake links can be used to persuade you to part...
View ArticleCompromised Accounts Tweeting Links to Malware
It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year....
View ArticlePST Migration with Enterprise Vault 10.0.4
PST files are a bit of a paradox- they’re equally great and painful. End-users love them because they are in total control of how and where they save their valuable messages for easy access later. IT...
View ArticleOutlook problem after running FixOrphanedShortcut?
I know from experience that there many, many registry keys that are public knowledge relating to Enterprise Vault, and also from my 6+ years in Enterprise Vault Engineering there are a whole load of...
View Article3D Printing Physical Keys
3D printers are fascinating devices that are becoming affordable and widely available. Many people love to experiment with them, bringing innovation to many different fields. There are so many things...
View ArticleBusiness continuity - a ship that's already sailed?
We've been talking about business continuity for years. No, make that decades. While a standard for business continuity planning has only existed since 2006, organisations have been defining what...
View ArticleAbout MAXTRANSFERSIZE parameter in SQL backup script
First, I just want to clarify that MAXTRANSFERSIZE is not a NetBackup-specific code/parameter.Rather, it's a standard parameter used by Microsoft SQL virtual device (VDI) during backup/restore. Pretty...
View ArticleAdministrator Account Discovery
One of the most dangerous threats to IT security is abuse of privileged access. Preventing the exploitation of administrator privileges first requires knowledge of who has administrator access whether...
View Article1st Half 2013 Microsoft Privilege Vulnerabilities
In the past 6 months Microsoft has released 51 Security Bulletins addressing 121 vulnerabilities. Here’s a breakdown of the bulletins and vulnerabilities. Of the 51 Microsoft Security Bulletins...
View Article