Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

1st Half 2013 Mozilla Privilege Vulnerabilities

In the past 6 months Mozilla has released 62 Security Bulletins addressing 88 vulnerabilities. Of the 62 Mozilla Security Bulletins released more than 1 out of every 2 bulletins had vulnerabilities...

View Article


1st Half 2013 Adobe Privilege Vulnerabilities

In the past 6 months Adobe has released 16 Security Bulletins addressing 116 vulnerabilities. Of the 16 Adobe Security Bulletins released 81% had vulnerabilities that could be used to exploit the...

View Article


1st Half 2013 Apple Privilege Vulnerabilities

In the past 6 months Apple has released 2 Security Updates for their Windows versions of Quicktime and iTunes addressing 52 vulnerabilities. Both of the Apple Security Bulletins released had...

View Article

Image may be NSFW.
Clik here to view.

感染したアカウントがマルウェアへのリンクをツイート

ソーシャルメディアのアカウント、なかでも Twitter アカウントを利用して、Android.Opfake(昨年のブログを参照)などをホストしている悪質なサイトにユーザーを誘導する手口は、特に珍しいものではありません。シマンテックは最近、何も知らない一般ユーザーのアカウントが感染して、こうしたタイプの悪質なリンクをフォロワーにツイートしているケースを確認しました。 図...

View Article

Image may be NSFW.
Clik here to view.

物理的な鍵の 3D コピー

3D プリンタは魅力的なデバイスで、最近では値段も手ごろになり、広く利用できるようになりつつあります。多くのユーザーが好んで 3D プリンタを試用し、さまざまな分野にイノベーションを起こしています。3D 印刷によって可能なことはあまりに多く、武器の模造など物議を醸すアイデアの実現から、鍵の複製までさまざまです。ここで言っているのは、単に安っぽいプラスチック製の複製の話だけではありません。新型の 3D...

View Article


Query to display which computers have a SSD drive

According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks. However we can identify the SSDs from the Inv_HW_Logical_Device data class.  You can copy...

View Article

Symantec Managed Security Services Certified as PCI DSS v2.0 Service Provider

By Brian Dunphy, senior director, product management, Symantec Managed Security ServicesIn the current business climate, organizations that need to process, store or transmit credit card data are most...

View Article

Reminder - Reduce Endpoint Displacement and Increase Deal Size

In January 2014, Symantec Endpoint Protection 11 will reach End of Support Life. Keep your customers protected with a free upgrade to Endpoint Protection 12. Strengthen your long-term relationships by...

View Article


Image may be NSFW.
Clik here to view.

“LNK” Attacks are Back Again

Recently, we observed an attack campaign using link files attached to emails in Japan. We have blogged about threats utilizing link files before and this type of attack is still alive and well.The...

View Article


Pro Bono ... It's Not Just for Lawyers Anymore

Did you know that Symantec's legal department has had a formal pro bono program since 2007?Since 2007, Symantec attorneys, paralegals and public affairs staff have been applying their day-job skills to...

View Article

Ingesting data into subfolders

When you do PST Migration with Enterprise Vault or any of the third party products out there, one question that I always ask is: Where do you want the data to end up? What I mean by this is: - do you...

View Article

Microsoft Patch Tuesday – August 2013

Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing eight bulletins covering a total of 23 vulnerabilities. 14 of this month's issues are rated...

View Article

Image may be NSFW.
Clik here to view.

Android Cryptographic Issue May Affect Hundreds of Thousands of Apps

There’s been a lot of confusion over the last few days, since bitcoin.organnounced that an Android component responsible for generating secure random numbers contained a critical weakness that rendered...

View Article


Image may be NSFW.
Clik here to view.

終わらない "LNK"攻撃

日本では最近、電子メールにショートカット(.lnk)ファイルを添付する攻撃活動が確認されています。ショートカットファイルを使った脅威については以前のブログでもお伝えしましたが、この種の攻撃がいまだに活動を続けています。ショートカットは、リンク先がテキストファイルであるかのように偽装されているため、欺かれたユーザーはこれを開いてしまいますが、実際はテキストファイルが開くわけではないことに気がつきません...

View Article

Image may be NSFW.
Clik here to view.

Android の暗号化に関する問題が数十万ものアプリに影響する恐れ

Android でセキュアな乱数を生成するコンポーネントに致命的な脆弱性があるため、Android 用の多くの Bitcoin ウォレットが脆弱になる。Bitcoin.orgからこのような発表があったことを受けて、数日間は大混乱が続きました。Bitcoin ウォレットの脆弱性を引き起こす原因となる問題はさまざまです。Bitcoinは、正規の所有者しか資金を使えないようにするために...

View Article


Looking for Smarter BYOD Options

 mobilesecurity.com [Ratingen, Germany] Symantec's Markus Gruneberg wrote an interesting whitepaper on the topic of BYOD recently. Follow the link below for the full article.The challenge of BYOD...

View Article

Biometric Smartphone Security makes Progress

 mobilesecurity.com [London, UK] Industry observers, manufacturers and developers have all predicted that biometrics could have a role to play in the future of mobile security and now independent...

View Article


E-commerce in the Middle East – On the Up and Up!

E-commerce is on a massive upward trajectory in the Middle East and North Africa (MENA) region. According to a recent report issued by Visa[1], nowhere else in the world is growing as fast: MENA...

View Article

Never Been to Vision? Tell Us Why and Receive 200 Connect Rewards Points and...

Never attended a Symantec Vision conference?  We want to know why.  For the first 20 people (10 in the US and 10 in Europe) who sign up and participate in a 30-minute interview before August 22nd,...

View Article

Save the Date: Google+ Hangout – Why Host-Based SSDs are Critical for SLAs in...

Service level agreements (SLAs) must be met whether you’re keeping mission-critical data centers running or serving up frosty beverages. Disasters, configuration errors, poor performance, thirsty...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>