Determining the archived date from the saveset path and file name
Technique to determine an reasonably accurate archive date and time from the saveset path and file name続きを読む...
View ArticleHow iOS 8 Will Affect the Security of iPhones and iPads
Apple’s mobile OS has been enhanced, but is it more secure?続きを読む...
View ArticleEmerging Threat - Anonymous - Operation Petrol (June 20 2014)
Emerging Threat - Anonymous - Operation Petrol (June 20 2014)EXECUTIVE SUMMARY:Who: Anonymous, a politically motivated group of hacktivists (mostly Middle East based). Specifically the AnonGhost group...
View ArticleSocial Login Phishing Epedemic is about to hit
Ive just come off 'Gigya's' latest Webinar about the power of social login for marketing. You know, when you go to a website and your asked to create an account but you also have the option to simply...
View ArticleA World Without Passwords
While online identity remains a tough nut to crack, it becomes clearer every day that we must move beyond using passwords sooner than later. Passwords have several weakness that leave corporate users,...
View ArticleWhat CSOs Need to Know About Managing a Mega Breach
Symantec CIO, Sheila Jordan, provides "survival skills" in an Op-ed for Dark Reading 2013 was the "Year of the Mega Breach." Clearly, hackers are upgrading their tools and creating more sophisticated...
View ArticleConsumer Market for Communication Service Providers
A lot of headroom in mobile security While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide...
View ArticleSymantec Intelligence Report: May 2014
Welcome to the May edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and...
View Article5 Reasons to Upgrade to Data Loss Prevention 12.5
Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62...
View ArticleZorenium Bot Not Half the Threat It Claims to Be
Symantec finds out if this infostealer bot is as sophisticated as its marketing suggests.続きを読む...
View ArticlePinterest and Tumblr Accounts Compromised to Spread Diet Pill Spam
Spam related to Garcinia Cambogia Extract diet pills also cross-posted to Twitter and avoids spam filters on social networks.続きを読む...
View ArticleRedes botnet em smartphones Android
Por: Raphael Sanches C. PaciulliIntroduçãoO sistema operacional com a maior abrangência entre os fabricantes de smartphones é sem dúvida o Android da gigante de buscas Google. De acordo com estudos de...
View ArticleHardware Protected Mobile Applications are the Wave of the Future
VIP Access for Android 2.2 - part of the new wave The new VIP Access for Android release catches the wave of new hardware protected applications.続きを読む...
View ArticleLet’s Not Print Social Media For Productions
As I do everyday, I receive these posts and articles about eDiscovery. Not very often does it make me want to create an article about it and share the details of a valuable topic.As this case will...
View ArticleClearwell V7.1.4 Fix1
Good afternoon, We have discovered a bug when installing the fix 1 on clearwell 7.1.4. If you install with the standard .exe package, in a distributed architecture, you will find an error on each of...
View ArticleiPhone や iPad のセキュリティに影響する iOS 8 の新機能
Apple 社のモバイル OS に新機能が搭載されますが、セキュリティは強化されるのでしょうか。続きを読む...
View ArticleHow Many Archiving Policies are Enough?
In your Enterprise Vault world, how many archiving policies do you have? Is one sufficient? Maybe for some people it is, but for most a couple of policies will be sufficient. Sometimes though you’ll...
View ArticleHow can Communication Service Providers (CSPs) address the SMB market?
An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are...
View ArticleSP1 pour la 7.5; encore mieux que le passage de la 7.1 à la 7.5
Update OR NOT update ? Le Service Pack 1 de la version 7.5 apporte le support de : - IE 10 et IE 11 pour la console.... Enfin! - Windows 2012 comme serveur Altiris.続きを読む...
View ArticleAltiris 7.5 Upgrade Webinar- Why now is the time to upgrade
Novacoast hosting Altiris 7.5 webinar Join Novacoast on June 24th, at 11am EST for an Altiris 7.5 webinar- Follow the link below to register...
View Article