A note on things to come
January was a busy month with the release of aila2 here on Connect.Interestingly enough it feels like I have spent much more time documenting the tool-kit and features than coding it, and I'm not...
View ArticleNOTICE OF END OF STANDARD SUPPORT AND END OF SUPPORT LIFE for Altiris...
On October 7, 2013 version 7.5 of ITMS was made generally available. Symantec Corporation will End of Life (“EOL”) the earlier releases of this product including Components, Agents, Options any...
View Article{CWoC} Software Delivery execution trending project overview
IntroductionI have done a few project with the Google Chart API's now [1][2][[3] and I am becoming addicted to the results it provides. There's nothing like a line chart to show you at a glance what is...
View Article{CWoC} Trending SWD Execution - quick samples page
Introduction:A few hours only past since my first post [1] on this matter, but there's nothing like Connect to keep the momentum.So this evening I have 3 elements to add to the project:The generic SQL...
View ArticleAdobe Issues Patch for Exploitable Vulnerability in Flash
Adobe has published a Security Bulletin for Adobe Flash Player CVE-2014-0497 Remote Code Execution Vulnerability (CVE-2014-0497). The new Security Bulletin, APSB14-04, identifies an integer underflow...
View ArticleAdobe 社が Flash に存在する悪用可能な脆弱性に対するパッチを公開
Adobe 社は、Adobe Flash Player に存在するリモートコード実行の脆弱性(CVE-2014-0497)に対するセキュリティ情報を公開しました。この新しいセキュリティ情報 APSB14-04 によると、複数のプラットフォームで、さまざまバージョンの Adobe Flash Player...
View ArticlePOS マルウェアと攻撃手口の解明
サイバー犯罪者がクレジットカード情報を求める貪欲さには、際限がありません。オンラインで情報を盗み出す手口はいくつもありますが、なかでも狙いやすい標的が POS システムです。小売店の店頭レジ端末(POS)システムにおける購買額の 60% が、クレジットカードまたはデビットカードを使って支払われているという統計もあります。大規模な小売店では POS...
View ArticleTwitter 上の 100 万ドル規模のコンテストを乗っ取った詐欺師
先日のスーパーボウルで話題になった Esurance 社のコンテストへの参加者を狙って、詐欺師はさっそく攻撃を仕掛けています。スーパーボウル終了直後に CM を放映した同社は、#EsuranceSave30 というハッシュタグを使って投稿した Twitter ユーザーの中から抽選で 1 名に 150...
View ArticleSymantec Endpoint Management customer testimonial - Helse Nord - Smart OS...
Many thanks to Pål Kristiansen of Helse Nord for presenting at our EPM 7.5 Launch events in Oslo, it was great to see how Symantec technology is helping to meet their business challanges.Please...
View ArticleTraining Future Cybercrime Fighters to Protect Your Thermostat
As we saw at CES this year, the "Internet of Things" is here to stay. With more and more platforms, social networks and search engines monitoring our actions and mining our data, questions around how...
View ArticlePaul Walker’s Death Used to Spread Personalized Trojan Horses
It was only a few months ago that Paul Walker that left us in a fiery car accident. These days it is common for spammers and malware writers to use a celebrity’s death to spread malware. In this case,...
View ArticleStorageOnlineOPNS issues on large scale Enterprise Vault Environment
Yesterday I encountered a rather odd issue at a customers site, whereby the storage service seemed to have gone a little bit, well, how shall we say ... mad? After a little bit of troubleshooting I...
View ArticleBanclip, ShadesRat, and Malware Detections
On January 23, CERT Polska posted a blog describing a piece of minimalist banking malware targeting Polish citizens. The hashes of several samples of the malware were also listed in the blog. Symantec...
View ArticleProtecting Your Social Accounts for Safer Internet Day
Whether it’s National Cyber Security Awareness Month in October or Safer Internet Day in February, it’s always important to remember to be safe online every day. As technology continues to become more...
View ArticleHow customers really react to web browser security warnings
The University of California, together with Google, recently undertook a study to track real-world clickthrough rates from browser security warnings in two of the most popular web browsers Google...
View ArticleConnect Dev Notes: 04 Feb 2014
Updates deployed to the Connect production servers as a result of the code sprint that ended 04 February 2014.User Facing: DesktopAdded the ability to subscribe to email notifications for a target...
View Articleポール・ウォーカーさんの逝去を悪用して拡散する、個別設定されたトロイの木馬
ポール・ウォーカーさんが交通事故で亡くなったのは、ほんの数カ月前のことです。最近では、スパマーやマルウェア作成者が有名人の死亡記事を悪用してマルウェアを拡散する手口が多用されています。今回の場合、始まりはポール・ウォーカーさんの車が炎上している動画へのリンクを記載した電子メールですが、そこには悪質なファイルへのリンクが含まれています。最近大量に確認されている電子メールの場合、送信者は、ウォーカーさん...
View ArticleTiylon: A Modern Bank Robber
The biggest bank robbery of all time was identified in Brazil in 2005. In this case, a gang broke into a bank by tunneling through 1.1 meters of steel and reinforced concrete and then removed 3.5 tons...
View ArticleWindows updates and SEP
Finding the hidden dangers Windows Updates and SEP installations.
View Article