Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

spear phishing

Results for spear phishing

サイバースパイ活動の背後にいるグループが、進化したマルウェアを使って旧東側諸国を標的としています。 Wipbot や Turla ...
Blog Entry by Symantec Securi... | 12 Aug 2014 | 0 comments
The Underground Economy Series, Pt. 7 With billions of records and other credentials being compromised ...
Blog Entry by Tim G. | 08 Aug 2014 | 0 comments
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries. A cyberespionage ...
Blog Entry by Symantec Securi... | 07 Aug 2014 | 0 comments
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries. Symantec ...
Blog Entry by Symantec Securi... | 07 Aug 2014 | 0 comments
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries. Wipbot과 Turla라는 ...
Blog Entry by Symantec Securi... | 07 Aug 2014 | 0 comments
Cyberespionage group uses sophisticated malware to target former Eastern Bloc countries. Uma campanha de ...
Blog Entry by Symantec Securi... | 07 Aug 2014 | 0 comments
summary Contributor: Andrea Lelli Operation Francophoned , first uncovered by Symantec in May 2013 , involved organizations receiving direct phone calls and spear phishing ...
Blog Entry by Lionel Payet | 23 Apr 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
サイバー攻撃はますます大規模に、そして大胆になっているため、セキュリティ対策にも新たなアプローチが必要になってきています。サイバー犯罪者は、従来のコンピュータシステム以外にも攻撃対象を広げており、今ではインターネットに接続できるデバイスのほとんどが標的になる恐れがあります。2013 年は大規模なデータ侵害の年であり、推定 5 億件の情報が漏えいするという史上最大のデータ侵害も発生しました。 店頭レジ端末(POS) ...
Blog Entry by Orla Cox | 03 Apr 2014 | 0 comments
Attacks are getting bigger and bolder and this calls for a new approach to cybersecurity. Cybercriminals have broadened their scope beyond conventional computer systems and now almost every connected device can be a target. 2013 was the year of the ...
Blog Entry by Orla Cox | 02 Apr 2014 | 0 comments