1st Half 2013 Mozilla Privilege Vulnerabilities
In the past 6 months Mozilla has released 62 Security Bulletins addressing 88 vulnerabilities. Of the 62 Mozilla Security Bulletins released more than 1 out of every 2 bulletins had vulnerabilities...
View Article1st Half 2013 Adobe Privilege Vulnerabilities
In the past 6 months Adobe has released 16 Security Bulletins addressing 116 vulnerabilities. Of the 16 Adobe Security Bulletins released 81% had vulnerabilities that could be used to exploit the...
View Article1st Half 2013 Apple Privilege Vulnerabilities
In the past 6 months Apple has released 2 Security Updates for their Windows versions of Quicktime and iTunes addressing 52 vulnerabilities. Both of the Apple Security Bulletins released had...
View Article感染したアカウントがマルウェアへのリンクをツイート
ソーシャルメディアのアカウント、なかでも Twitter アカウントを利用して、Android.Opfake(昨年のブログを参照)などをホストしている悪質なサイトにユーザーを誘導する手口は、特に珍しいものではありません。シマンテックは最近、何も知らない一般ユーザーのアカウントが感染して、こうしたタイプの悪質なリンクをフォロワーにツイートしているケースを確認しました。 図...
View Article物理的な鍵の 3D コピー
3D プリンタは魅力的なデバイスで、最近では値段も手ごろになり、広く利用できるようになりつつあります。多くのユーザーが好んで 3D プリンタを試用し、さまざまな分野にイノベーションを起こしています。3D 印刷によって可能なことはあまりに多く、武器の模造など物議を醸すアイデアの実現から、鍵の複製までさまざまです。ここで言っているのは、単に安っぽいプラスチック製の複製の話だけではありません。新型の 3D...
View ArticleQuery to display which computers have a SSD drive
According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks. However we can identify the SSDs from the Inv_HW_Logical_Device data class. You can copy...
View ArticleSymantec Managed Security Services Certified as PCI DSS v2.0 Service Provider
By Brian Dunphy, senior director, product management, Symantec Managed Security ServicesIn the current business climate, organizations that need to process, store or transmit credit card data are most...
View ArticleReminder - Reduce Endpoint Displacement and Increase Deal Size
In January 2014, Symantec Endpoint Protection 11 will reach End of Support Life. Keep your customers protected with a free upgrade to Endpoint Protection 12. Strengthen your long-term relationships by...
View Article“LNK” Attacks are Back Again
Recently, we observed an attack campaign using link files attached to emails in Japan. We have blogged about threats utilizing link files before and this type of attack is still alive and well.The...
View ArticlePro Bono ... It's Not Just for Lawyers Anymore
Did you know that Symantec's legal department has had a formal pro bono program since 2007?Since 2007, Symantec attorneys, paralegals and public affairs staff have been applying their day-job skills to...
View ArticleIngesting data into subfolders
When you do PST Migration with Enterprise Vault or any of the third party products out there, one question that I always ask is: Where do you want the data to end up? What I mean by this is: - do you...
View ArticleMicrosoft Patch Tuesday – August 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing eight bulletins covering a total of 23 vulnerabilities. 14 of this month's issues are rated...
View ArticleAndroid Cryptographic Issue May Affect Hundreds of Thousands of Apps
There’s been a lot of confusion over the last few days, since bitcoin.organnounced that an Android component responsible for generating secure random numbers contained a critical weakness that rendered...
View Article終わらない "LNK"攻撃
日本では最近、電子メールにショートカット(.lnk)ファイルを添付する攻撃活動が確認されています。ショートカットファイルを使った脅威については以前のブログでもお伝えしましたが、この種の攻撃がいまだに活動を続けています。ショートカットは、リンク先がテキストファイルであるかのように偽装されているため、欺かれたユーザーはこれを開いてしまいますが、実際はテキストファイルが開くわけではないことに気がつきません...
View ArticleAndroid の暗号化に関する問題が数十万ものアプリに影響する恐れ
Android でセキュアな乱数を生成するコンポーネントに致命的な脆弱性があるため、Android 用の多くの Bitcoin ウォレットが脆弱になる。Bitcoin.orgからこのような発表があったことを受けて、数日間は大混乱が続きました。Bitcoin ウォレットの脆弱性を引き起こす原因となる問題はさまざまです。Bitcoinは、正規の所有者しか資金を使えないようにするために...
View ArticleLooking for Smarter BYOD Options
mobilesecurity.com [Ratingen, Germany] Symantec's Markus Gruneberg wrote an interesting whitepaper on the topic of BYOD recently. Follow the link below for the full article.The challenge of BYOD...
View ArticleBiometric Smartphone Security makes Progress
mobilesecurity.com [London, UK] Industry observers, manufacturers and developers have all predicted that biometrics could have a role to play in the future of mobile security and now independent...
View ArticleE-commerce in the Middle East – On the Up and Up!
E-commerce is on a massive upward trajectory in the Middle East and North Africa (MENA) region. According to a recent report issued by Visa[1], nowhere else in the world is growing as fast: MENA...
View ArticleNever Been to Vision? Tell Us Why and Receive 200 Connect Rewards Points and...
Never attended a Symantec Vision conference? We want to know why. For the first 20 people (10 in the US and 10 in Europe) who sign up and participate in a 30-minute interview before August 22nd,...
View ArticleSave the Date: Google+ Hangout – Why Host-Based SSDs are Critical for SLAs in...
Service level agreements (SLAs) must be met whether you’re keeping mission-critical data centers running or serving up frosty beverages. Disasters, configuration errors, poor performance, thirsty...
View Article