Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

ISTR XV

Results for ISTR XV

Web browsers are an integral part of home and business computing environments and one of the most popular and ubiquitous applications on computer systems. Due to their popularity, the exploitation of security vulnerabilities in browsers is a common ...
Blog Entry by Greg Ahmad | 30 Apr 2010 | 0 comments
Far gone are the times when truly remote server-side vulnerabilities were the most popular vectors for compromising machines and attacking organizations. More than 93 percent of vulnerabilities exploited in recent years have been client-side security ...
Blog Entry by Adrian Pisarczyk | 27 Apr 2010 | 0 comments
In 2009, the Induc virus was the top new malicious code sample observed by Symantec worldwide. Notably, Induc does not actually do anything strictly malicious; all it does is propagate. No keystroke logging, no spam sending abilities, no ad clicking, ...
Blog Entry by Brent Graveland | 23 Apr 2010 | 0 comments
In this day and age we’re all aware of the threat cybercriminals pose to our personal information. If you’re not careful, items such as your credit card number could fall into the wrong hands, resulting in unauthorized goods and services being purchased ...
Blog Entry by Ben Nahorney | 22 Apr 2010 | 0 comments
I am proud to announce the release of Volume 15 of the Symantec Global Internet Security Threat Report . I would like to take this opportunity to give a preview of the some of the findings in the vulnerabilities section of this report. In previous ...
Blog Entry by David McKinney | 21 Apr 2010 | 0 comments
Ranks and podium finishes are no doubt one of the key highlights of the recently concluded 2010 Olympic winter games. Likewise, rankings are an aspect of many metrics used for analysis in the Symantec Global Internet Security Threat Report and there ...
Blog Entry by Téo Adams | 20 Apr 2010 | 0 comments