Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Ransomware

Results for Ransomware

The Underground Economy, Pt. 6 Once touted as a single currency to rule them all, the peer-to-peer ...
Blog Entry by Tim G. | 06 Aug 2014 | 0 comments
The Underground Economy, Pt. 2 Hearing a story about an organized crime ring demanding protection money from ...
Blog Entry by Tim G. | 28 Jul 2014 | 0 comments
Trends are complicated things. Consider, for example, the threat often called Ransomware. In our annual Internet Security Threat Report , all signs were that it was following a steady growth path which would continue into 2014. However, more up to ...
Blog Entry by Paul Wood | 14 Jul 2014 | 0 comments
今回確認された最新の脅威は、より高度なモバイルランサムウェアの登場を予感させるものです。 シマンテックは昨年 6 月、Android デバイスを人質に取って身代金を要求する偽セキュリティアプリ Android ...
Blog Entry by Joji Hamada | 12 Jun 2014 | 0 comments
Latest mobile threat could herald the arrival of more sophisticated mobile ransomware. Just around this time last ...
Blog Entry by Joji Hamada | 09 Jun 2014 | 0 comments
今年も、シマンテックの最新の調査結果をお伝えする 『インターネットセキュリティ脅威レポート』(ISTR) (英語)をお届けする時期になりました。過去 1 ...
Blog Entry by Kevin Haley | 16 Apr 2014 | 0 comments
In security as in business, information is power. As we put together the latest edition of the Internet Security Threat Report, we wanted to do more than simply throw some figures out there. As a result, Volume 19 presents a comprehensive analysis of ...
Blog Entry by Paul Wood | 08 Apr 2014 | 0 comments
Once again, it’s time to reveal the latest findings from our Internet Security Threat Report (ISTR) , which looks at the current state of the threat landscape, based on our research and analysis from the past year. Key trends from this ...
Blog Entry by Kevin Haley | 08 Apr 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
サイバー犯罪者はいつでも、マルウェアを進化させる方法を探っています。ウイルス対策をめぐる研究や解析、対策が進み、ユーザー意識が向上したためマルウェアの威力が薄れ、拡散も鈍っていることから、進化が生存の鍵となっているからです。ランサムウェアは、この数年間でメディアに大きく取り上げられた結果、知らぬ間に犠牲になるユーザーが減り、その影響力や効果も半減するとともに、犯罪者にとって費用対効果も下がってきました。 このようにユーザー意識が高まった結果、2013 ...
Blog Entry by Symantec Securi... | 09 Dec 2013 | 0 comments