Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

how to disable UAC

How to Set UAC not be displayed for installing MSI's in win-7?

View Article


Image may be NSFW.
Clik here to view.

分割したマルウェアを利用する標的型攻撃

最近、標的型攻撃でマルウェアを企業に送りつける手段として、ショートカットファイルがよく使われるようになってきました。シマンテックは、ネットワークに侵入するためにショートカットファイルが使われるさまざまな手法を確認しており、その一例を以前のブログでもお伝えしました。最近も、セキュリティ製品による検出をすり抜け、電子メールの受信者を欺いて添付ファイルを実行させるためにショートカットファイルが使われている...

View Article


Storage Foundation High Availability (SFHA) 5.1SP1 Rolling Patch 4 (RP4) now...

  SFHA 5.1SP1RP4 is now available on SORT:https://sort.symantec.com/patch/finder  11Veritas Storage Foundation HA 5.1SP1PR3Rolling Patchsfha-sol10_x64-5.1SP1PR3RP42013-08-2112Veritas Storage Foundation...

View Article

Imaginative Programs + Caring Mentors = Sparking STEM Interest in Underserved...

In its fiscal year 2013, Symantec contributed more than $24 million in cash and software to nonprofits working within its four philanthropic focus areas: science, technology, engineering, and math...

View Article

Image may be NSFW.
Clik here to view.

G20 Summit Used as Bait to Deliver Backdoor.Darkmoon

Ahead of this week's G20 summit in Saint Petersburg, Russia, attackers are leveraging the meeting's visibility in targeted attacks.One particular campaign we have identified is targeting multiple...

View Article


Good Security Equals Privacy

If it’s worth doing, it’s worth doing on the Internet. And it’s not just Silicon Valley startups that feel this way – cybercriminals do, too. In fact, most types of cons and crimes have migrated to the...

View Article

Image may be NSFW.
Clik here to view.

Backdoor.Darkmoon を拡散するワナとして利用される G20 サミット

今週ロシアのサンクトペテルブルクで開催が予定されている G20 サミットを目前にして、攻撃者はサミットの知名度を標的型攻撃に利用しています。シマンテックが検出したある攻撃では、金融機関、金融サービス企業、政府機関、経済開発関連の組織など複数のグループを標的としています。 図 1. G20 の代表から送信されたと騙る電子メール この電子メールは、G20...

View Article

Image may be NSFW.
Clik here to view.

Outlook Add-in versions

Do you know what version of the Outlook Add-in is running in your environment? Do you care what version is running? You should - and in many organisations even those that employ software deployment...

View Article


Connect Dev Notes: 04 September 2013

Updates deployed to the Connect production servers as a result of the code sprint that ended 03 September 2013.User Facing: DesktopChanged the Quick Search in the Help Center to look for titles that...

View Article


Image may be NSFW.
Clik here to view.

Spanish RAT

Contributor: Roberto Sponchioni Symantec Security Response has recently come across a new remote administration tool (RAT) called Alusinus, which we detect as Backdoor.Alusins. The program was intended...

View Article

Save the Date - VMware Backups That Work Google+ Hangout

We’ve pushed the backup performance envelope so that you don’t have to! VMware Backup Benchmarks have been around since 2007 and continue to be an important part of keeping data centers running...

View Article

Image may be NSFW.
Clik here to view.

スペイン語の RAT

寄稿: Roberto Sponchioniシマンテックセキュリティレスポンスは最近、Alusinus という新しいリモートアクセスツール(RAT)を発見しました(Backdoor.Alusinsとして検出されます)。これは、スペイン語圏のアンダーグラウンド向けのプログラムで、ビルダー自体はいくつかの標準機能を備えた単純なものですが、その中に興味深く、特筆に値する機能が 1...

View Article

Enterprise Vault 11 Beta Program

Are you eager to get a sneak peek into the all new and exciting features of Enterprise Vault 11 release? Then here is your chance to do so, by participating in the upcoming Enterprise Vault 11 Beta...

View Article


Small Businesses: The Shift in Website Threats

Last year saw a shift in website threats, with more targeted attacks emerging that were aimed at small and medium businesses. While website security should always be at the forefront of any online...

View Article

Coming Soon: Symantec's 2013 Corporate Responsibility Report

Corporate responsibility is inherent to Symantec’s business and built into our priorities and values. This month Symantec will release its FY13 Corporate Responsibility Report, which provides an update...

View Article


When is a Basic Inventory not a Basic Inventory?

Today is riddle day. So here it is in full:When is a basic inventory not a basic inventory?When it's a custom inventory!!!So, now this explains why we are getting thousands of customer inventory every...

View Article

NetBackup Snapshot Client Terminology Explained

Recently one of the fans of NetBackup on Facebook asked a question. Although his questions were specific to the difference between Snapshot client backup and regular backups, I thought it might be...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Vault retrievals using Outlook Web App

A question which came from the Symantec Enterprise Vault Connect forums the other day deserves a little more of an answer than I originally gave.  The question is: When you retrieve an item from a...

View Article

Image may be NSFW.
Clik here to view.

Creating Self-Documenting Monitor Solution Reports

 Been messing the last few days with a combination of t-sql and Word macros to create a way of documenting the policies and rules for Altiris Monitor 7.1 servers.All pretty much done, so am writing up...

View Article

NetBackup 7.6 First Availability (FA) Program announced for October

Recently, a letter was sent out announcing the NetBackup 7.6 First Availability (FA).  If you didn't receive it, here is a crossposting.  (Note that I personally have no information beyond what's in...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>