Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

IoT Security and the law of unintended consequences

It’s still early days for the Internet of Things (IoT). While some are suggesting a complete revolution in 'smart' physical objects which will change our lives, I don’t think anyone will notice that...

View Article


DS6.9 SP6 fix for ALTIRIS_PXE_IP environment variable not being set

View Article


Image may be NSFW.
Clik here to view.

スパマーオフィス探訪(失敗)記

スパム送信で特に頻繁に使われる手口のひとつが、「かんじきスパム」とも呼ばれる一撃離脱タイプのスパムです。スパム対策フィルタをできるだけ多くすり抜けられるように、多数の IP アドレスとドメインを用意して、スパムを大量送信するとすぐに新しい IP アドレスとドメインに移行するという手法に特徴があります。一度使われた IP...

View Article

Code signing 101: Why developers need digital certificates for applications

Code signing 101 Code signing does two things extremely well: it confirms who the author of the software is and proves that the code has not been altered or tampered with after it was signed. Both are...

View Article

Image may be NSFW.
Clik here to view.

Ataques contra o setor de energia

A energia é crucial para o nosso estilo de vida moderno. Entretanto, relatos de tentativas de ataques virtuais contra as empresas fornecedoras estão aumentando a cada ano. No primeiro semestre de 2013,...

View Article


Image may be NSFW.
Clik here to view.

Snapchat Fruit Spam Delivered by Real, Compromised Accounts

In the latest Snapchat spam developments, an increasing number of the photo-sharing app’s users have been sending out spam pictures of fruits or fruit-based drinks to their contacts, which directs them...

View Article

Application Metering usage data for a specifc file name

If you don't like drilling down into the usage report, here is a SQL query that you can run to find usage data either for all files that have been metered or for a specifc file:SELECT rf.Name AS...

View Article

How to create Site filters based off of manually created sites

If you have chosen to create your sites and subnets manually instead of importing them from AD, what is the easiest way to create filters that contain the computers associated with those sites?The...

View Article


マイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2014 年 2 月

今月のマイクロソフトパッチリリースブログをお届けします。今月は、31 件の脆弱性を対象として 7 つのセキュリティ情報がリリースされています。このうち 25...

View Article


Image may be NSFW.
Clik here to view.

危殆化した実在のアカウントから送信される Snapchat のフルーツスパム

写真共有アプリ Snapchat を利用したスパムの最近の傾向として、フルーツやフルーツ系ドリンクのスパム写真がユーザーの連絡先に送信されるケースが増えています。写真のリンク先は、「Frootsnap」や「Snapfroot」という Web サイトです。図 1. Snapchat 上のフルーツスパムシマンテックは数カ前から Snapchat...

View Article

Security within the data centre - making things happen in business time,...

Virtualisation brings enormous benefits to organisations everywhere, fundamentally altering the way in which they do business. It’s not a new concept, of course, but we are now seeing it being applied...

View Article

We Asked University Students!

What Advice Would You Give Your Teenage Self About Staying Safe Online? Earlier this week, we heard about Safer Internet Day from Anne Collier of NetFamilyNews.org. Today, Marian Merritt, Symantec's...

View Article

Why is Healthcare so Bad at IT Risk Management? (Part 1 of 2)

And how can we fix it . . . Why is healthcare so bad at IT Risk Management?Good question. And I certainly have my opinions about that. Last fall I moderated a panel on post-Omnibus security and I got...

View Article


Why is Healthcare so Bad at IT Risk Management? (Part 2 of 2)

What will it take to make IT Risk Management a team sport in healthcare? If I still haven’t made it clear, let me just say it: IT Risk Management is not an IT issue. Nor is it an IT problem to be...

View Article

Potential Internet Explorer 10 Zero-Day Vulnerability

Symantec is currently investigating reports of a potential zero-day exploit affecting Internet Explorer 10 in the wild. This appears to be a watering hole attack that was hosted on a compromised...

View Article


In Love With Integrated Backup Appliances

By 2017, the purpose built backup appliance is estimated to be $6B in size (based on projections from IDC), essentially the same size as the enterprise backup software market. Even as it grows, this...

View Article

Internet Explorer 10 にゼロデイ脆弱性の可能性

シマンテックは現在、Internet Explorer 10 に影響するゼロデイ脆弱性の悪用の可能性が確認されたという報告について調査しています。これは、米国の Web サイトに侵入し、それをホストとして利用した「水飲み場型」攻撃のようです。無警戒なユーザーが水飲み場型攻撃の Web サイトにアクセスすると、ゼロデイ攻撃がホストされている別の侵入先の Web...

View Article


Doing Well and Doing Good ... In Peru

As many of you may recall, we made a significant addition to our mission last year... adding corporate responsibility leadership to our overall goals because it's an integral part of our overall...

View Article

Doing well and doing good...in Peru

As many of you may recall, we made a significant addition to our mission last year... adding corporate responsibility leadership to our overall goals because it's an integral part of our overall...

View Article

Image may be NSFW.
Clik here to view.

New Internet Explorer 10 Zero-Day Discovered in Watering Hole Attack

In an earlier blog, Symantec highlighted that we were investigating reports of a zero-day exploit affecting Internet Explorer 10 in the wild. Now we have further details on the attack leveraging this...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>