Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations

News/Recent articles and whitepapers

Created: 12 Apr 2011 • Updated: 19 Dec 2014
Symantec Analyst Relations's picture
+3 3 Votes
Login to vote

Regin: Top-tier espionage tool enables stealthy surveillance

DroidJack RAT: A tale of how budding entrepreneurism can turn to cybercrime

11/19 Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack®

11/05 Symantec Reports Second Quarter Fiscal Year 2015 Results

11/04 Symantec Adds Two New Executives to its Security Business

October 2014

Security vendors take action against Hidden Lynx malware

Symantec and Europol strengthen cooperation in joint fight against cybercrime

10/09 Symantec Announces New Strategy to Fuel Growth

Symantec Archives: 2014, 2013, 2012, 2011

_______________________________________________________________________________________________

Security Response Publications

Symantec Security Response is a worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users.
 
The Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. This report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. In 2013, much attention was focused on cyber-espionage, threats to privacy and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging threats from cybercriminals continue to loom over businesses and consumers.

Symantec Intelligence Report: November 2014

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

___________________________________________________________________________________________________________

Latest product updates

_______________________________________________________________________________________

Related articles and whitepapers

Please download the Whitepapers by clicking on the links below