Altiris 7.5 Roadshow
We’re loading up the RV and hitting the road with Symantec to talk about Altiris 7.5. And We’re Coming To A City Near You. We’re loading up the RV and hitting the road with Symantec to talk about...
View ArticleNeed more information on Tracks
Endpoint Management/ITSM/Service Desk I would very much like to know when more information will be coming out about what is available in the Endpoint Management Track. More specifically, I am...
View ArticleTo Protect Your POS, Add Layers
Is antivirus enough to protect your Point of Sale and valuable customer data? Why layered protection is the best way to secure your transactions with confidence.
View Articleモノのインターネット: あらゆるモノがつながる世界に登場する新たな脅威
ベビーモニターが覗き見に悪用されるということはありえるでしょうか。テレビがユーザーの視聴傾向を監視したり、自動車が悪質な攻撃者によってハッキングされたりする可能性はあるでしょうか。はたまた、セットトップボックスやインターネットルーターのようにどう見ても無害そうなデバイスが、ホームコンピュータへの侵入口として利用されることはありえるでしょうか。「モノのインターネット」(IoT)が実現するとともに、セキ...
View ArticleWindows Malware Attempts to Infect Android Devices
We’ve seen Android malware that attempts to infect Windows systems before. Android.Claco, for instance, downloads a malicious PE file along with an autorun.inf file and places them in the root...
View ArticleThe Internet of Things: New Threats Emerge in a Connected World
This Blog was originally posted in Security Response.Could your baby monitor be used to spy on you? Is your television keeping tabs on your viewing habits? Is it possible for your car to be hacked by...
View ArticleNot Your Average Business Trip - Symantec International Service Corps Heads...
In one month, I take off for Peru where I have the chance to join the inaugural Symantec Service Corps on a four-week assignment to support a skills-based project with a local organization. I am...
View ArticleWhat Really Makes a Market Leader?
Many vendors claim to be #1. But there are clear benchmarks for this debate and three in particular that seem to point in one direction.
View ArticleViruses and Worms: It’s like comparing Apples and ….maggots. – Support...
Recently we have seen a re-emergence of polymorphic file infectors, AKA viruses.Threats like W32.Sality and W32.Xpiro are using some old-school tactics to infect good files and spread through networks....
View ArticleDangers of domain-validated certificates
SSL certificates do more than encrypt data, they also authenticate websites. This is an important and fundamental function because it builds trust. Website visitors see the SSL padlock or HTTPS and...
View ArticleSocial media attacks - new takes on old confidence tricks
Over the past couple of years, we have seen social engineering attacks graduate from email to that increasingly prevalent form of communication - social media. By ‘social engineering’ we’re talking...
View ArticleDespite the News, Your Refrigerator is Not Yet Sending Spam
You may have seen media reports based on research by Proofpoint that hundreds of home devices such as entertainment systems and even a refrigerator had been sending spam. We refer to this collection of...
View ArticleAndroid デバイスへの感染を試みる Windows マルウェア
Windows システムへの感染を試みる Android マルウェアについては、以前にお伝えしたことがあります。たとえば Android.Clacoは、autorun.inf ファイルと一緒に悪質な PE ファイルをダウンロードして SD カードのルートディレクトリに配置します。感染したモバイルデバイスが USB モードでコンピュータに接続されたときに、そのコンピュータで AutoRun...
View ArticleDS6.9 SP6 axengine may fault under bootwiz high load
This is an FYI for something we've seen in our environment.We upgraded a Deployment Server from SP4 to SP6 and installed the Windows 8 AIK. When we build our WinPE4 boot images, the compression stage...
View ArticleBaseline Filtering Engine service issue.
Windows firewall issue After a virus/malware outbreak, SEP is corrupt. Re installation results in either a rollback or a failed installation of SEP. A message will show in SEPM that the installation...
View ArticleConnect Dev Notes: 24 January 2014
Updates deployed to the Connect production servers as a result of the code sprint that ended 21 January 2014.User Facing: DesktopAdded the ability for blog admins to add short "Author Bios" to each...
View Article*New* SQL Move Tool
For a long time moving SQL servers underneath Enterprise Vault took a bit of time and a bit of planning. Actually plenty of time and plenty of planning!I spotted something rather interesting on the...
View ArticleMalware de Windows Trata de Infectar los Dispositivos Android
Hemos visto en otras ocasiones que el malware para Android intenta infectar los sistemas de Windows. Por ejemplo, Android.Claco descarga un archivo en formato portable ejecutable (PE) malicioso junto...
View Article