Patch Tuesday January 2014 - Security Bulletins from Microsoft, Adobe and Oracle
Microsoft Security BulletinOn Tuesday the 14th of JanuaryMicrosoft released the monthly Security Bulletin Summary for January 2014. The summary includes 4 Security Bulletins that cover altogether 6...
View ArticleEvent Queue Processing Performance Query - TECH183347
with Event Queue descriptions Modified SQL Query from TECH183347 to add Queue descriptions to Queue numbers
View ArticleConsider Security Before Building Your Nest
As we continue to connect ourselves and our lives to the greater consiousness of the Internet, we need to consider the potential implications on our security, privacy and benefits.
View Article2014 Small Business Security Trends
Small businesses can benefit greatly by using the latest technologies to improve operational efficiency and innovation, but they can also open the door to a host of headaches. In 2014, we will see...
View ArticleSnapchat Spam: Sexy Photos Lead to Compromised Branded Short Domains
A few weeks after our blog post about porn and secret admirer spam targeting Snapchat users, a new spam campaign using sexually suggestive photos and compromised custom URLs is circulating on the photo...
View Article休暇ぼけを狙ってマルウェア攻撃を仕掛ける詐欺師
詐欺師がインターネットユーザーの気の緩みを狙うのは、特に驚くことでもありません。シマンテックは、ホリデーシーズン後の数日間にわたって、新たにマルウェアが増加していることを確認しました。休暇が終わると、重要なメッセージを見逃していないかどうかを確かめるために、多くのユーザーがツールや電子メールを確認します。スパマーはそこを狙って、ユーザーが電子メール中の悪質なリンクをクリックすることに期待を掛けている...
View Article大きく復活した .zip 添付スパム
スパマーは、長らく途絶えていた古い手法を再び使い始めています。.zip ファイルを添付し、ユーザーを欺いて圧縮形式のマルウェアを実行させるという手口です。以下のグラフは、.zip ファイルが添付されたスパムメッセージが、シマンテックの Global Intelligence Network(GIN)で過去 90 日間にわたって検出された件数を示しています。 図 1. .zip...
View ArticleWhat does having an SSL certificate mean for a website?
An SSL certificate is the internet’s symbol for security on a website. It means that the internet user is protected for all the data that they provide on that website.
View ArticleVertical Password Guessing Attacks Part II
In the last installment we planned the vertical password guessing attack and optimized our wordlist. Now let's get our hands dirty! Attackers utilize a variety of tools to automate password guessing...
View ArticleSymantec Named a Leader in the Gartner Magic Quadrant for Endpoint Protection...
Gartner Inc. has once again positioned Symantec as a Leader in the Magic Quadrant for Endpoint Protection Platforms (EPP) – a position Symantec has held for a 12-year span.¹ We believe this leadership...
View ArticleSymantec Intelligence Report: December 2013
Welcome to the December edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...
View ArticleStaying CyberStreetWise
A UK Government public awareness campaign Cyberstreetwise.com launched this week, aiming to help educate UK consumers and small businesses about online security. The campaign, running for three months...
View ArticleTargeted attacks and the rise of "Hackers for Hire"
Targeted attacks were the main focus of our September 2013 Intelligence Report. There's good news and bad news: on the upside, such threats are lower than this time last year, even though they have...
View ArticleEnabling Mobile Workers Just Got Easier
The Symantec Mobile Sealed Program is Now Available! Today, we’re excited to announce the availability of the Symantec Sealed Program that enables enterprises to adopt their choice of third-party...
View ArticleConnect Trusted Advisor Solves More Than 2,500 Questions
Congratulations to Trusted Advisor Marianne Van Den Berg Marianne recently surpassed 2,500 solutions in the forums. In other words, she has solved more than 2,500 questions you have asked on the...
View ArticleSnapchat スパム: セクシーな写真のリンク先はブランド名入りの危殆化した短縮ドメイン
このブログで、Snapchat ユーザーを狙うポルノスパムと「隠れファン」スパムを取り上げてから数週間が経過しましたが、今度は性的に思わせぶりな写真に加えて、危殆化したカスタム URL を使う新しいスパム攻撃が Snapchat 上で出回っています。 図 1. Snapchat スパム スパムメッセージにはそれぞれ、モバイルデバイス用 Kik...
View ArticleSoftware" SQL article has been updated">"Manage > Software" SQL article has been updated
I have just updated my article by adding a comment that includes the SQL behind the new view that ITMS 7.5 adds to "Manage > Software".https://www-secure.symantec.com/connect/articles/s...
View ArticleAutomate and delegate common SEP tasks with workflow
There are too many service requests that are handled manually and spread across multiple systems, which are repeatable and are using several approval steps. That makes the service delivery both time...
View ArticleCyber resilience – more than just good technology!
FireEye’s recent acquisition of incident response and forensics specialist Mandiant for around $1 billion has been a real high profile eye catcher. The move greatly broadens the FireEye product and...
View ArticleHow to convert a registry file to a batch file
RegToBat Converter is a simple tool to convert a registry file (.reg) to the batch file (.bat).
View Article