Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Would You Like Some Fish with That Phishing Site?

Phishers are known for making their phishing sites look exactly like the sites they are spoofing. We have seen plenty of examples of the detail they employ, like using JavaScript to include the current...

View Article


Mobile workforce productivity with Symantec Sealed

One of the central challenges of what we call 'consumerisation' is to balance the benefits of employees using their own devices and applications with the risks. Looking at device compliance for...

View Article


Our Commitments in Action: Symantec's 2013 Corporate Responsibility Report

I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge...

View Article

Save the Date - Why do you need third party archiving capabilities with...

 Organizations considering Microsoft Office 365 will need to use third party offerings to either supplement or replace some of the capabilities in Microsoft’s offering.Tune in to the next installment...

View Article

Image may be NSFW.
Clik here to view.

フィッシングサイトで魚釣りはいかが

フィッシング詐欺師がフィッシング用のサイトを本物のサイトとそっくり同じに偽装しようとすることは、よく知られています。JavaScript...

View Article


マイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2013 年 9 月

今月のマイクロソフトパッチリリースブログをお届けします。今月は、47 件の脆弱性を対象として 13 個のセキュリティ情報がリリースされています。このうち 13...

View Article

Our Commitments in Action: Symantec's 2013 Corporate Responsibility Report

I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge...

View Article

Two New Symantec Board Members Nominated

With the summer coming to an end and the analyst event season on the horizon, the AR Team at Symantec is looking forward to seeing many of you in person over the next few months.  We will be reaching...

View Article


Symantec at M6 Mobility Xchange

 Here we are, 24 hours away from M6 Mobility Xchange in San Diego.   I am very excited to attend this event for the first time and I cannot write enough about how proud we are to share with you about...

View Article


What are the Enterprise Vault Converters?

People who have been around Enterprise Vault for quite a while will have heard of the Enterprise Vault Converters. In this post I'll explain a little bit about the converters, what they do, and why...

View Article

Symantec Achieves Certifications to Help Government Balance BYOD Productivity...

By Dr. Rose Quijano-Nguyen, Principal Certification Strategist – Global Vertical Offerings, Symantec Corp.As remote working arrangements and “bring your own device” programs become more and more...

View Article

Cybersecurity is a business problem

Cybersecurity is certainly a hype word in the press at the moment. Security professionals and CSOs that are longer in the tooth are saying, "move along, nothing new here" - are they right? To answer...

View Article

Image may be NSFW.
Clik here to view.

Android Mobile App Pen-Test Tricks Part I – Installing CA Certificates

Just like a web application penetration test, a mobile application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work,...

View Article


Testing the Norton Secured Seal in a Development Environment

We have written this short blog post about how to set up and test the Norton Secured Seal in a website development environment after recieveing a question about it on Twitter @nortonsecured Customers...

View Article

Image may be NSFW.
Clik here to view.

Hidden Lynx – Professional Hackers for Hire

For the past few years, reports have continued to emerge detailing the activities of actors behind various targeted attacks or Advanced Persistent Threats (APTs). Here at Symantec Security Response,...

View Article


Symantec Encryption Product Updates

Symantec Encryption Releases 3.3.1/10.3.1 In this release, we support Windows 8, increase our Linux platform support, and as always improve security whenever appropriate.  Here’s a summary of what’s...

View Article

Office 2011 for Mac Updated

I still try to use my Hackintosh as much possible, though it's not quite as much as I like. Because I use it reasonably often, I now like to keep up to date with things like Office 2011 for Mac updates...

View Article


Symantec Intelligence Report: August 2013

In this month’s report we take a look at social media scams so far in 2013. What we have noticed is that fake offerings, such as bogus opportunities for discount purchases, has dominated the social...

View Article

New Internet Explorer Zero-day Found in Targeted Attacks

On September 17, Microsoft issued an advisory reporting a new zero-day vulnerability in Internet Explorer: Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893). The advisory...

View Article

How to create multiple complex passwords

Most people use the same password for email, shopping and social networking websites because their chosen password is easy to remember. This is a great risk, in fact in case of a security breach at one...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>