Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Security Community Blog

Results for Security Community Blog

Some bad news for Android users, A security weakness in Android mobile operating system versions below 5.0 has been noticed. It puts potentially every Android device at risk for privilege escalation attacks. It has been patched in Android 5.0 Lollipop – ...
Blog Entry by Avkash K | 20 Nov 2014 | 0 comments
攻擊者持續運用 Sandworm 這項漏洞,使用可繞過其修正程式的攻擊程式,以電子郵件附加檔案形式傳送受感染的 PowerPoint 文件。 至少有兩群攻擊者仍持續運用近期發現的 Windows Sandworm 漏洞,使用可繞過修正程式的攻擊程式。這項漏洞隨著名為 Sandworm 的團體所撰寫的攻擊程式而曝光,但現在有部分證據顯示,在這些團體中至少有一個團體於 ...
Blog Entry by Sherry Fang | 17 Nov 2014 | 0 comments
Give about ten minutes of your time to help Symantec improve its knowledgebase content. We need your help!  We would be grateful if you could give us about ten minutes of your time to ...
Blog Entry by Jeremy Henricks | 13 Nov 2014 | 4 comments
Registration Open Symantec are building a new security client designed specifically for embedded systems.  We’ve taken the code base of our Critical System Protection client edition ...
Blog Entry by Matt Cooke | 12 Nov 2014 | 0 comments
Wirelurker 可用於竊取遭到入侵的 iOS 裝置中的資訊。 Symantec Security Response 正在調查鎖定執行 Mac OS X 的 Apple 電腦以及執行 iOS 的 Apple ...
Blog Entry by Symantec Securi... | 06 Nov 2014 | 0 comments
Wirelurker可用于从受感染的 iOS 设备窃取信息。 赛门铁克安全响应中心当前正在调查 OSX.Wirelurker ,该威胁的主要攻击目标为运行 Mac OS X 的 Apple 计算机以及运行 ...
Blog Entry by Symantec Securi... | 06 Nov 2014 | 0 comments
Stay Protected By Updating to SEPM 12.1.5 Today, Symantec released a new security advisory impacting older versions of the Symantec Endpoint Protection Manager (SEPM). Product ...
Blog Entry by Kari Ann | 05 Nov 2014 | 5 comments
在 安全通訊端層 (Secure Sockets Layer,SSL) 3.0 加密通訊協定  (SSLv3) 中發現一項錯誤,該錯誤 可能會造成通訊協定遭到入侵,以攔截電腦與伺服器之間本應加密處理的資料 。三名 Google 安全研究員發現這項瑕疵,並詳述如何透過所謂的  Padding Oracle On Downgraded Legacy Encryption (POODLE,貴賓狗) 攻擊  ( CVE-2014-3566 ) 進行入侵。 值得注意的是,這 ...
Blog Entry by Sherry Fang | 05 Nov 2014 | 0 comments
Security Real-time Dashboards   Security Security presents a challenge with regards to data analysis for two distinct reasons. First and foremost is the enterprise’s ...
Blog Entry by ryanschoenherr | 27 Oct 2014 | 0 comments
Attackers continue to take advantage of the Sandworm vulnerability by using an exploit that bypasses its patch to send compromised PowerPoint documents as email attachments. 적어도 두 개 이상의 ...
Blog Entry by Symantec Securi... | 22 Oct 2014 | 0 comments