Please find the link on the subject: http://go.symantec.com/sourcecode
There is nothing to worry about as long as you are upgraded and updated with respect to virus defs.
Please find the content of the link and confirm if this helped you!!
Symantec can confirm that a segment of its source code has been accessed. Symantec’s own network was not breached, but rather that of a third party entity. Based on our current analysis, we have no indication that the code disclosure impacts the functionality or security of Symantec’s solutions. Furthermore, there are no indications that customer information has been impacted or exposed at this time.
What products were impacted?
Our analysis shows that only portions of the source code for Symantec Endpoint Protection (SEP) 11.0 and Symantec AntiVirus 10.2 were exposed. The exposed source code is very old (from 2006 and 2007) and has undergone many updates since that time. To the best of our knowledge, no active Norton products are affected.
What new risks could result from this disclosure?
Our threat response team has examined this issue in some detail. Given the limited scope of disclosure and the extensive protection mechanisms in-built to Symantec software, we believe the risk to our customers from this unfortunate incident is negligible.
What should I do if my organization uses one of these products?
There is nothing additional that customers need to do beyond adhering to best practices. The code that has been exposed is so old that current security settings will suffice against any possible threats that might materialize as a result of this incident.
Our recommended best practices include:
- Making sure your AV definitions are up to date
- Making sure your software is upgraded to the latest maintenance version
- As it makes sense for your organization, upgrade to the latest version of Symantec Endpoint Protection, which is SEP 12.1 RU1