Would You Like Some Fish with That Phishing Site?
Phishers are known for making their phishing sites look exactly like the sites they are spoofing. We have seen plenty of examples of the detail they employ, like using JavaScript to include the current...
View ArticleMobile workforce productivity with Symantec Sealed
One of the central challenges of what we call 'consumerisation' is to balance the benefits of employees using their own devices and applications with the risks. Looking at device compliance for...
View ArticleOur Commitments in Action: Symantec's 2013 Corporate Responsibility Report
I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge...
View ArticleSave the Date - Why do you need third party archiving capabilities with...
Organizations considering Microsoft Office 365 will need to use third party offerings to either supplement or replace some of the capabilities in Microsoft’s offering.Tune in to the next installment...
View Articleフィッシングサイトで魚釣りはいかが
フィッシング詐欺師がフィッシング用のサイトを本物のサイトとそっくり同じに偽装しようとすることは、よく知られています。JavaScript...
View Articleマイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2013 年 9 月
今月のマイクロソフトパッチリリースブログをお届けします。今月は、47 件の脆弱性を対象として 13 個のセキュリティ情報がリリースされています。このうち 13...
View ArticleOur Commitments in Action: Symantec's 2013 Corporate Responsibility Report
I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge...
View ArticleTwo New Symantec Board Members Nominated
With the summer coming to an end and the analyst event season on the horizon, the AR Team at Symantec is looking forward to seeing many of you in person over the next few months. We will be reaching...
View ArticleSymantec at M6 Mobility Xchange
Here we are, 24 hours away from M6 Mobility Xchange in San Diego. I am very excited to attend this event for the first time and I cannot write enough about how proud we are to share with you about...
View ArticleWhat are the Enterprise Vault Converters?
People who have been around Enterprise Vault for quite a while will have heard of the Enterprise Vault Converters. In this post I'll explain a little bit about the converters, what they do, and why...
View ArticleSymantec Achieves Certifications to Help Government Balance BYOD Productivity...
By Dr. Rose Quijano-Nguyen, Principal Certification Strategist – Global Vertical Offerings, Symantec Corp.As remote working arrangements and “bring your own device” programs become more and more...
View ArticleCybersecurity is a business problem
Cybersecurity is certainly a hype word in the press at the moment. Security professionals and CSOs that are longer in the tooth are saying, "move along, nothing new here" - are they right? To answer...
View ArticleAndroid Mobile App Pen-Test Tricks Part I – Installing CA Certificates
Just like a web application penetration test, a mobile application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work,...
View ArticleTesting the Norton Secured Seal in a Development Environment
We have written this short blog post about how to set up and test the Norton Secured Seal in a website development environment after recieveing a question about it on Twitter @nortonsecured Customers...
View ArticleHidden Lynx – Professional Hackers for Hire
For the past few years, reports have continued to emerge detailing the activities of actors behind various targeted attacks or Advanced Persistent Threats (APTs). Here at Symantec Security Response,...
View ArticleSymantec Encryption Product Updates
Symantec Encryption Releases 3.3.1/10.3.1 In this release, we support Windows 8, increase our Linux platform support, and as always improve security whenever appropriate. Here’s a summary of what’s...
View ArticleOffice 2011 for Mac Updated
I still try to use my Hackintosh as much possible, though it's not quite as much as I like. Because I use it reasonably often, I now like to keep up to date with things like Office 2011 for Mac updates...
View ArticleSymantec Intelligence Report: August 2013
In this month’s report we take a look at social media scams so far in 2013. What we have noticed is that fake offerings, such as bogus opportunities for discount purchases, has dominated the social...
View ArticleNew Internet Explorer Zero-day Found in Targeted Attacks
On September 17, Microsoft issued an advisory reporting a new zero-day vulnerability in Internet Explorer: Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893). The advisory...
View ArticleHow to create multiple complex passwords
Most people use the same password for email, shopping and social networking websites because their chosen password is easy to remember. This is a great risk, in fact in case of a security breach at one...
View Article