Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Striking a balance between privacy and security

It can often seem that security measures exist to stop people from doing things, or to try to catch them out if they do. Across organisations, an broadening range of mechanisms can be used to ensure...

View Article


Protect against "Goto fail" SSL exploit in mobile apps

Leverage Symantec app wrapping to require strong encryption Protect your mobile apps against vulnerabilities like Apple's "Goto fail" SSL exploit by using Symantec's app wrapping.Read more...

View Article


How to tackle SQL Performance issues

Performance degradation can happen due to multiple reasons. The main bottlenecks that would affect performance are:MemoryDisk IOCPUBlockingSystem resource contentionApplication design problemsQueries...

View Article

Receive a Free Pass to Vision for Your Customer

The new Bring Your Customer Advocate to Vision program offers Symantec partners the opportunity to receive a free pass to Vision 2014 for your customer in exchange for a qualifying reference...

View Article

Partner Engage México 2014 y el Rediseño de Nuestro Programa de Canal: ¿Cómo...

Por Rodrigo Gómez, Director Comercial y de Canales para Symantec en MéxicoEl 17 de febrero en la Ciudad de México llevamos a cabo nuestro Partner Engage 2014, un evento anual que creamos para ustedes,...

View Article


Image may be NSFW.
Clik here to view.

モバイルマルウェア 10 年の歴史

図. モバイルマルウェアの歴史 2014 年は、モバイルマルウェアが登場してから 10 年目に当たります。2004 年に SymbOS.Cabirの最初の亜種がセキュリティ研究者の元に届けられたのがすべての始まりです。解析の結果、このワームは Symbian OS を標的にすることが判明しました。Symbian は、当時非常に人気を博していたオペレーティングシステムです。SymbOS.Cabir...

View Article

Image may be NSFW.
Clik here to view.

モバイルソフトウェアマーケットに暗い影を落とすグレイウェア

モバイルセキュリティで非常に厄介なのが、「グレイウェア」をめぐる問題です。正規のソフトウェアとマルウェアとの間に明確な境界線はなく、グレイウェアは概ねその曖昧な領域に存在します。グレイウェアとは、明らかにマルウェアと言えるものを隠し持っているとは限らないものの、何らかの形でユーザーにとって有害または迷惑なアプリのことです。たとえば、ユーザーの所在や Web...

View Article

Image may be NSFW.
Clik here to view.

JRAT Targets UK and UAE in Payment Certificates Spam Campaign.

Java remote access Trojan (RAT) campaigns aren’t rare anymore. Their prevalence has increased in the past few years and they have continued to target both enterprises and individuals. The popularity of...

View Article


Image may be NSFW.
Clik here to view.

Postcards from Peru: Taking in the Peruvian Culture

Week 2 of Symantec's Service Corps Project Entering the second week in Peru, the Symantec Service Corps (SSC) team has settled into their business projects as well as their home for the month, Hotel...

View Article


Vision 2014 Conference Topics for NetBackup

Greetings NetBackup professionals! The NetBackup product team is actively planning for our biggest Vision conference ever. In addition to participating in over 100 training sessions and hand-on labs,...

View Article

Image may be NSFW.
Clik here to view.

10 rookie SSL mistakes and how to avoid them

Choosing based on price. Not all certificate authorities (CA) are the same. The security of your certificates depends in part on how secure the CA is, so it pays to choose wisely. In addition, when...

View Article

Image may be NSFW.
Clik here to view.

支払い証明書スパム攻撃で英国とアラブ首長国連邦を狙う JRAT

Java ベースのリモートアクセスツール(RAT)を使った攻撃も、もはや異例ではなくなりました。過去数年間で広がりを見せ、その後も企業と個人の両方を標的にし続けています。こういった攻撃がこれほど一般化したのも、特に驚くことではありません。RAT によってコンピュータへの感染に成功すると、攻撃者はそのコンピュータを完全に制御できるからです。それだけでなく、この攻撃は理論上、Java...

View Article

Image may be NSFW.
Clik here to view.

Sochi Olympics Terrorism Fears Used as Bait for Targeted Darkmoon Campaigns

While the Sochi Winter Olympics may now be over without incident, considering all of the media attention and fears surrounding a potential terrorist attack at the event, it should come as no surprise...

View Article


Support for Exchange 2013 SP1, SharePoint 2013 SP1, Office 2013 SP1

Microsoft announced availability of an SP1 for many of its 2013 wave of products.Specifically this includes Exchange 2013, SharePoint 2013 and Office 2013.The service packs will be run through our...

View Article

5 Vision Announcements You May Have Missed

Week of Feb 24-28 Vision is the content-rich conference that brings technology leaders and experts together to exchange techniques and strategies for success. 1. Do you qualify as a Vision Alumni?...

View Article


SORT your next NetBackup upgrade

Upgrading… For System Administrators, this can be a painful idea.  What are the new hardware requirements? Where do I get the software? What is the correct process for my environment’s upgrade? So much...

View Article

Image may be NSFW.
Clik here to view.

Darkmoon による標的型攻撃で餌に使われた、ソチオリンピックに対するテロの脅威

ソチオリンピックはどうやら平穏に幕を閉じたようですが、この一大イベントがテロリストに狙われる可能性についてメディアの注目と懸念が集まっていたことを考えると、サイバー犯罪者がその不安心理を突いて、興味を示しそうなユーザーを標的にしていたのも予想外のことではありません。開催期間中に、シマンテックはソチオリンピックの話題を餌にした標的型の電子メール攻撃を複数確認しました。確認された電子メール攻撃は...

View Article


Image may be NSFW.
Clik here to view.

A Perspective on Software Defined Security

Virtualization and “software defined” initiatives have shifted how we look at security controls. Let’s take a look at some of the factors to consider in designing security controls for a software...

View Article

Announcing the End of Life of Symantec Network Access Control 12.1

End-of-Life, End-of-Availability and End-of-Support Announcement We have an important update to share with you regarding Symantec Network Access Control. At Symantec, we actively monitor security...

View Article

Image may be NSFW.
Clik here to view.

Brains vs Brawn: EMC highlights why Data Domain is losing share

A tweet from the guys at EMC caught our eye:This link lead to an nice blog entry about how EMC and Teradata are improving their partnership etc etc. but we noticed that the blog neglects to address...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>