Understanding the ResourceAssociation table
The following query maps item names to the three different guids found within the ResourceAssociation table, allowing you to understand its contents better:SELECT vi1.[Guid] AS...
View ArticleStorage and Partitions
Do you store your Enterprise Vault data on locally attached disks to your server (DAS)? Do you use a Storage Area Network (SAN)? Do you use Network Attached Storage (SAN)? Whatever you use, the storage...
View Articleインターネット安心デー(Safer Internet Day)に向けてソーシャルアカウントを保護
10 月の全米サイバーセキュリティ意識向上月間(National Cyber Security Awareness Month)や、2 月のインターネット安心デー(Safer Internet Day)に限らず、日常的にオンラインの安全性を意識することは常に大切です。日常生活へのテクノロジの浸透が進み続けている今、自身の情報やデジタル ID...
View ArticleTiylon: 現代の銀行強盗
史上最悪の銀行強盗は、2005 年にブラジルで起きたものです。この事件で、銀行強盗団は鋼鉄と強化コンクリートでできた厚さ 1.1m もの壁に穴を開け、紙幣が保管されている 3.5 トンものコンテナを運び出しました。このとき、約 1 億 6,000 万ブラジルドル(3 億 8,000...
View ArticleMonitoring Android Network Traffic Part I: Installing The Toolchain
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....
View ArticleMonitoring Android Network Traffic Part II: Cross Compiling TCPDUMP
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....
View ArticleMonitoring Android Network Traffic Part III: Installing & Executing TCPDUMP
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....
View ArticleMonitoring Android Network Traffic Part IV: Forwarding To Wireshark
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....
View ArticleThe Mask
Modern cyberespionage campaigns are regularly defined by their level of sophistication and professionalism. “The Mask”, a cyberespionage group unveiled by Kaspersky earlier today, is no exception....
View ArticleSymantec MSS Threat Landscape Update: Point of Sale Malware
Credit and debit card data theft is one of the earliest forms of cybercrime and persists today. Cybercrime gangs organize sophisticated operations to steal vast amounts of data before selling it in...
View Article{CWoC} SWD Trending util progress report
I have progressed the Software Delivery trending tool quite nicely and has it often happen, the (interim) result drives the long term design.So far I have 2 files for the toolkit: an executable that...
View ArticleCustomer Safaris
On the hunt for Data Scientists, Storage Admins, and DBAs My name is Elizabeth Teffner. I'm a Customer Research Analyst at Symantec. Our Customer Research group is organizing Customer Safaris to...
View ArticleWebinar: The Cloud - A Game Changer For Healthcare
Wednesday, February 19, 2014 | 2:00 pm ET/11:00 am PT | Duration: 1 Hour Wednesday, February 19, 2014 | 2:00 pm ET/11:00 am PT | Duration: 1 HourThe use of cloud as a deployment alternative for IT...
View ArticleSafer Internet Day 2014
What “One Good Thing” Would You Do to Make the Internet Safer? Today is the launch of Safer Internet Day, an annual awareness campaign promoting safer and more responsible use of online technology and...
View ArticleMy (Failed) Visits to Spammers’ Offices
One of the most popular methods of spamming is snowshoe spam, also known as hit and run spam. This involves spam that comes from many IP addresses and many domains, in order to minimize the effect of...
View ArticlePatch Tuesday February 2014 - Security Bulletin Summary from Microsoft
Microsoft Security BulletinOn Tuesday the 11th of FebruaryMicrosoft released the monthly Security Bulletin Summary for February 2014. The summary includes 7 Security Bulletins - 4 are classified as...
View ArticleMicrosoft Patch Tuesday – February 2014
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing seven bulletins covering a total of thirty-one vulnerabilities. Twenty-five of this month's issues...
View ArticleAt HIMSS 2014 How Important Is . . .
What is big at the big show this year. Recently I got some information from HIMSS regarding the upcoming HIMSS14 and topics that attendees will be focused on. They had a great infographic that...
View Article12 Things to Look for in a Managed PKI Solution, Part 1
The purpose of this week’s blog post is to make you aware that not all Managed PKI providers are the same. In fact, there are some pretty significant differences between Symantec’s offerings relative...
View ArticleThe Mask(ザ・マスク)
最近のサイバースパイ活動は、その精巧さと専門性がたびたび明らかになっています。2 月 10 日に Kaspersky 社が報告した「The Mask(ザ・マスク)」と呼ばれるサイバースパイグループも例外ではありません。シマンテックが The Mask について調査したところ、このグループは 2007...
View Article