Ataques Dirigidos al Sector Energético
La energía es crucial para mantener nuestro estilo de vida moderno, por ello resulta inquietante el incremento anual de intentos de ataques reportados contra las compañías e industrias que la proveen....
View ArticleIntroducing DMARC Validation in Email Security.cloud
One of the oldest tricks in the book for spammers is to spoof or forge the "From" address so that the email appears to come from a legitimate source.This month, Symantec is introducing DMARC Validation...
View ArticleInternet of Things - What will we fail to anticipate?
I believe that the IT industry will, in the future, hold far more responsibility for radical changes to culture and society than ever before. The Internet of Things (IoT) will see humanity take a new...
View ArticleHow to temporary solve a problem with incompatibility of I.E 11 for SMP 7.5...
I.E.11 isn't officially supported in ITMS 7.5 release, therefore there could appear issue due incompatibility, while managing SMP 7.5 Console. Many people have Windows 8/8.1 OS and there is I.E. 11...
View ArticleFrequently Asked Questions on NetBackup Accelerator Part II
Network Attached Storage and Network Data Management Protocol Can I use NetBackup Accelerator to backup Network Attached Storage (NAS) devices? Is NFS mount host or CIFS mount host better to make use...
View ArticleSimple njRAT Fuels Nascent Middle East Cybercrime Scene
Symantec has observed the growth of indigenous groups of attackers in the Middle East, centered around a simple piece of malware known as njRAT. While njRAT is similar in capability to many other...
View ArticleSymantec Endpoint Protection receives the AV-TEST AWARD FOR BEST PERFORMANCE...
AV-TEST AWARD FOR BEST PERFORMANCE 2013 Symantec Endpoint Protection receives the AV-TEST AWARD FOR BEST PERFORMANCE 2013Corporate Users (Windows): Symantec Endpoint ProtectionThe AV-TEST AWARD FOR...
View ArticleITMS 7.5 HF5 Now Available via SIM
Hotfix 5 for Deployment Solution 7.5, Inventory Solution 7.5 and Symantec Management Platform 7.5 are now available via SIM.Not quite ITMS I know, but its a start. ;-)
View ArticleCryptoDefense, the CryptoLocker Imitator, Makes Over $34,000 in One Month
On the back of Cryptolocker’s (Trojan.Cryptolocker) perceived success, malware authors have been turning their attention to writing new ransomcrypt malware. The sophisticated CryptoDefense...
View ArticleLast Day for Early Bird Discount
Have you registered for Vision?Today is the last day to register to receive your $200 discount and exclusive Vision 2014 jacket. You can also pre-register for our most popular sessions and labs,...
View Article中東でサイバー犯罪社会の成立を煽るシンプルな njRAT
シマンテックは、中東で発生した攻撃者グループが、njRATとして知られるシンプルなマルウェアを使いながら勢いを伸ばしていることを確認しています。njRAT は、他の多くのリモートアクセスツール(RAT)と似た機能も備えていますが、アラビア語の話者によって開発、サポートされているという点が特徴的で、結果としてアラビア語圏の攻撃者の間で人気を集めています。njRAT...
View ArticleSymantec Named One of the World's Most Ethical Companies
By Paola Zeni, Symantec Director, Global Privacy, Ethics, and Compliance. Symantec has been recognized as a 2014 World's Most Ethical Company by the Ethisphere Institute, an independent center of...
View ArticleAs 5 Principais Razões Porque as Empresas Precisam Gerenciar As Aplicações...
Cheryl Tang, Senior Product Manager, Symantec Corp. illustrates why Mobile Application Management is vital to securing the future of "anywhere" business.Read more...
View ArticleBE 2012 BUG: false Linux Media Server Option license violation message
In https://www-secure.symantec.com/connect/forums/lin... I reported being surprised by my Backup Exec 2012 installation accusing me of a license violation (translated from German): Message:...
View ArticleCryptoLocker を模倣して 1 カ月で 34,000 ドルを稼いだ CryptoDefense
Cryptolocker(Trojan.Cryptolocker)が成功を収めたその裏で、マルウェアの作成者は新しい Ransomcrypt Trojan タイプのマルウェアの開発に精力を傾けていました。高機能化が進んだ CryptoDefense(Trojan.Cryptodefense)も、そうしたマルウェアのひとつです。CryptoDefense が出現したのは 2014 年 2...
View ArticleSymantec DLO 7.6 Beta Mac - Registrations Open!
Registrations for Symantec DLO 7.6 Beta Program is now open Register for Symantec DLO 7.6 Beta program https://symbeta.symantec.com/callout/?callid=86FFC...Read more...
View ArticleProactive Cybersecurity – Taking Control Away from Attackers
Attacks are getting bigger and bolder and this calls for a new approach to cybersecurity. Cybercriminals have broadened their scope beyond conventional computer systems and now almost every connected...
View ArticleExposed and vulnerable in a post-XP support world
Microsoft’s decision to switch off all support for Windows XP, some dozen years after it first made its entrance, is a momentous one. Those who have doggedly stuck by this much loved operating system,...
View ArticleConnect Dev Notes: 04 April 2014
Updates deployed to the Connect production servers as a result of the code sprint that ended 01 April 2014.User Facing: DesktopFixed an issue that was causing unauthenticated users to see an incorrect...
View ArticleResetting the admin password on a DC
Hello all,Recently I forgot the domain admin password for my lab, and was looking at a possible rebuild of the Domain Controller as a worst-case-scenario.Luckily, I found the folloiwng blog today which...
View Article