Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Patch Tuesday January 2014 - Security Bulletins from Microsoft, Adobe and Oracle

Microsoft Security BulletinOn Tuesday the 14th of JanuaryMicrosoft released the monthly Security Bulletin Summary for January 2014. The summary includes 4 Security Bulletins that cover altogether 6...

View Article


Event Queue Processing Performance Query - TECH183347

with Event Queue descriptions Modified SQL Query from TECH183347 to add Queue descriptions to Queue numbers

View Article


Consider Security Before Building Your Nest

As we continue to connect ourselves and our lives to the greater consiousness of the Internet, we need to consider the potential implications on our security, privacy and benefits.

View Article

2014 Small Business Security Trends

Small businesses can benefit greatly by using the latest technologies to improve operational efficiency and innovation, but they can also open the door to a host of headaches. In 2014,  we will see...

View Article

Image may be NSFW.
Clik here to view.

Snapchat Spam: Sexy Photos Lead to Compromised Branded Short Domains

A few weeks after our blog post about porn and secret admirer spam targeting Snapchat users, a new spam campaign using sexually suggestive photos and compromised custom URLs is circulating on the photo...

View Article


Image may be NSFW.
Clik here to view.

休暇ぼけを狙ってマルウェア攻撃を仕掛ける詐欺師

詐欺師がインターネットユーザーの気の緩みを狙うのは、特に驚くことでもありません。シマンテックは、ホリデーシーズン後の数日間にわたって、新たにマルウェアが増加していることを確認しました。休暇が終わると、重要なメッセージを見逃していないかどうかを確かめるために、多くのユーザーがツールや電子メールを確認します。スパマーはそこを狙って、ユーザーが電子メール中の悪質なリンクをクリックすることに期待を掛けている...

View Article

Image may be NSFW.
Clik here to view.

大きく復活した .zip 添付スパム

スパマーは、長らく途絶えていた古い手法を再び使い始めています。.zip ファイルを添付し、ユーザーを欺いて圧縮形式のマルウェアを実行させるという手口です。以下のグラフは、.zip ファイルが添付されたスパムメッセージが、シマンテックの Global Intelligence Network(GIN)で過去 90 日間にわたって検出された件数を示しています。 図 1. .zip...

View Article

What does having an SSL certificate mean for a website?

An SSL certificate is the internet’s symbol for security on a website. It means that the internet user is protected for all the data that they provide on that website.

View Article


Image may be NSFW.
Clik here to view.

Vertical Password Guessing Attacks Part II

In the last installment we planned the vertical password guessing attack and optimized our wordlist. Now let's get our hands dirty! Attackers utilize a variety of tools to automate password guessing...

View Article


Symantec Named a Leader in the Gartner Magic Quadrant for Endpoint Protection...

Gartner Inc. has once again positioned Symantec as a Leader in the Magic Quadrant for Endpoint Protection Platforms (EPP) – a position Symantec has held for a 12-year span.¹ We believe this leadership...

View Article

Symantec Intelligence Report: December 2013

Welcome to the December edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...

View Article

Image may be NSFW.
Clik here to view.

Staying CyberStreetWise

A UK Government public awareness campaign Cyberstreetwise.com launched this week, aiming to help educate UK consumers and small businesses about online security. The campaign, running for three months...

View Article

Targeted attacks and the rise of "Hackers for Hire"

Targeted attacks were the main focus of our September 2013 Intelligence Report. There's good news and bad news: on the upside, such threats are lower than this time last year, even though they have...

View Article


Enabling Mobile Workers Just Got Easier

The Symantec Mobile Sealed Program is Now Available! Today, we’re excited to announce the availability of the Symantec Sealed Program that enables enterprises to adopt their choice of third-party...

View Article

Image may be NSFW.
Clik here to view.

Connect Trusted Advisor Solves More Than 2,500 Questions

Congratulations to Trusted Advisor Marianne Van Den Berg  Marianne recently surpassed 2,500 solutions in the forums. In other words, she has solved more than 2,500 questions you have asked on the...

View Article


Image may be NSFW.
Clik here to view.

Snapchat スパム: セクシーな写真のリンク先はブランド名入りの危殆化した短縮ドメイン

このブログで、Snapchat ユーザーを狙うポルノスパムと「隠れファン」スパムを取り上げてから数週間が経過しましたが、今度は性的に思わせぶりな写真に加えて、危殆化したカスタム URL を使う新しいスパム攻撃が Snapchat 上で出回っています。 図 1. Snapchat スパム スパムメッセージにはそれぞれ、モバイルデバイス用 Kik...

View Article

Software" SQL article has been updated">"Manage > Software" SQL article has been updated

I have just updated my article by adding a comment that includes the SQL behind the new view that ITMS 7.5 adds to "Manage > Software".https://www-secure.symantec.com/connect/articles/s...

View Article


Image may be NSFW.
Clik here to view.

Automate and delegate common SEP tasks with workflow

There are too many service requests that are handled manually and spread across multiple systems, which are repeatable and are using several approval steps. That makes the service delivery both time...

View Article

Cyber resilience – more than just good technology!

FireEye’s recent acquisition of incident response and forensics specialist Mandiant for around $1 billion has been a real high profile eye catcher. The move greatly broadens the FireEye product and...

View Article

How to convert a registry file to a batch file

RegToBat Converter is a simple tool to convert a registry file (.reg) to the batch file (.bat).

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>