My note on how to accelerate Oracle with Symantec Storage Foundation using...
Accelerate Oracle with Symantec Storage Foundation
View ArticleProtecting the Next Flood of Information
At Symantec, we make the world a safer place by helping people, businesses, and governments protect and manage their information, so they can focus on achieving their goals.And protecting information...
View ArticleTop Viewed Content in 2013: Storage and Clustering Community
What were Storage and Clustering community members reading in 2013? Here's a list of our top-viewed community content from last year.Veritas disk group disabledVeritas Cluster - Steps for a...
View ArticleIoT and the problem of identity
Identity management was never easy. The basic need for identity is that of ‘non-repudiation’ - assurance that a person is who they say they are - as used to authenticate and authorise individuals to...
View ArticlePHP Inclusion Activity
Since the 14th of December, the SOC has noticed a substantial increase in the quantity of PHP code inclusion attacks against MSS customers. Specifically, attempts to compromise and infect internet...
View ArticleMaking Enterprise Vault More Secure
From time to time people ask questions about how to make Enterprise Vault data 'more secure'. This is usually around the under-the-covers activities like when a client retrieves an archived item, and...
View ArticleTransformational Smart Cities: cyber security and resilience
Smart cities are on the increase worldwide and, especially within Europe, there are many such initiatives being stimulated by the EC and national governments. Local administrators and policy makers are...
View ArticleDeepSight Portal Updates now available!
You spoke up, we listened! We know that information is only as useful as it is easy to find, access, and use – especially security intelligence. It’s our goal to continue to make it easier for the...
View ArticleGauging interest - Server Management Suite specific knowledge sharing sessions
We recently held our first User Group Summit with 75 customers representing 28 different User Groups. We also had several Symantec employees in attendance to network, field questions, share ideas,...
View ArticleHappy New Year from Symantec's Corporate Responsibility Team!
2013 was an eventful and exciting year here at Symantec, much of which we’ve documented using this space. While we’re all hard at work planning for our Fiscal Year 2015, which begins in April, January...
View ArticleIs this the end of ZeroAccess botnet?
It appears so. Zeroaccess botnet responsible for infecting around 2 million computers worldwide was targeted at making money through pay-per click advertising. It is also known it was able to download...
View ArticleFake Curse client stealing WOW's user credentials
In a recent "sticky" thread on Battle.net forums a new threat targetting WOW players has been reported. The Trojan "Disker" is able to compromise even the accounts using Authenticator Protection. It...
View ArticleConnect Dev Notes: 08 Jan 2013
Updates deployed to the Connect production servers as a result of the code sprint that ended 07 January 2014.User Facing: DesktopAdded the ability for users to browse from one unread post post in their...
View ArticleFake Browser Update Site Installs Malware
In the first week of 2014, we came across a website using tried and tested social engineering techniques to coerce victims into installing malware. The domain http://newyear[REMOVED]fix.com, was...
View ArticleMicrosoft end of support for Windows XP and Office 2003 - April 2014
As per Microsoft Support Lifecycle Policy both Windows XP SP3 and Office 2003 will reach end of support on April 8, 2014. The end of support means that after this date there will be no new security...
View ArticleUsability Study for EV Admins
Symantec would like to get your feedback on how we can improve the existing EV environment to make it easier for you. We are looking for EV administrators who use SCOM to monitor other applications, to...
View ArticleNew Year, New Apartment, Same Old Scams
The New Year has started and many people are still holding to their resolutions. Besides the usual suspects of exercising more and quitting smoking, some might have planned on finding a new apartment....
View ArticleImportance of key management
With the rise of Cybercrime, companies are investing significant amounts in Information Security in order to protect themselves, their employees and partners, but in the end that might not be enough.
View Article偽のブラウザ更新サイトでインストールされるマルウェア
2014 年最初の週に、シマンテックは定番とも言えるソーシャルエンジニアリングの手法を使い、被害者に強制的にマルウェアをインストールさせる Web サイトを確認しました。ドメインは http://newyear[削除済み]fix.com で、2013 年 12 月 30 日に登録されています。シマンテックの調査によると、攻撃の 94%...
View Article新年の新居探しを狙う昔ながらの詐欺
新しい年が始まりました。多くの人がまだ新年の抱負を抱き続けている時期でしょう。今年こそ運動しようとか禁煙しようという定番のほか、新しいアパートを探そうと計画している方もいるかもしれません。ただし、それは賃貸の手付金詐欺広告も増えるということなので、新居を探すときには注意が必要です。賃貸の手付金詐欺広告は、ほとんどの国で、ほぼあらゆるプラットフォームで見受けられます。広告はどれも本格的ですが、中には正...
View Article