Video Screencast Help

Email Security.cloud

Results for Email Security.cloud

Webcast Thu, 01 November, 2012 - 9:30 PDT Google and Microsoft have recently made announcements they are ...
Event by Turls | 29 Oct 2012 | 0 comments
シマンテックは、URL に .gov が含まれるスパムメッセージの増加を確認しています。以下に示すのが、そのサンプルメッセージのスクリーンショットです。     本来、.gov を使う URL は政府系機関に限定されているため、なぜスパマーがスパムメッセージの URL に .gov を使えるのかという疑問が生じます。 その答えは、 この Web ページ にあります。 1.USA.gov is the result of a ...
Blog Entry by Eric Park | 22 Oct 2012 | 0 comments
Symantec is observing an increase in spam messages containing .gov URLs. A screenshot of a sample message is below:     Traditionally, .gov URLs have been restricted to government entities. This brings up the question of how spammers are ...
Blog Entry by Eric Park | 19 Oct 2012 | 0 comments
Recientemente, los phishers han tomado un gran interés por los temas relacionados con el futbol. Después de que hace unas semanas Symantec descubriera algunos engaños y estafas relacionadas con la FIFA World Cup de 2014, ahora los ciberatacantes pusieron ...
Blog Entry by Mathew Maniyara | 18 Oct 2012 | 0 comments
<p>Use this forum to initiate general discussion regarding Cloud Computing. For product-specific discussions, please visit the individual <a ...
IT Trend by Kevin | 17 Oct 2012 | 0 comments
I frequently present on security threats and the Symantec Internet Security Threat Report.  There are many great statistics from the current report, 403M unique variants of malware, 5.5B web attacks blocked, 4,597 web attacks per day, etc.   I ...
Blog Entry by Joseph.Rogalski | 15 Oct 2012 | 0 comments
Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure. When selecting a new service they have either gone to tender or bought an off the shelf ...
Blog Entry by Pritesh J. Chauhan | 11 Oct 2012 | 0 comments
This blog continues from Part One . Firstly we looked at how the email got through in the first place. The technique of an email coming from one place, but appearing to come from another is known as spoofing . Often in larger organisations it ...
Blog Entry by Matthew R. Ellison | 10 Oct 2012 | 0 comments
Over the past couple of weeks we have been working very closely with a customer who was the victim of a phishing scam. Specifically it was a whale phishing (or whaling) technique, a type of spear phishing attack that is directly targeted at senior ...
Blog Entry by Matthew R. Ellison | 10 Oct 2012 | 0 comments
It’s no great surprise that our houses and lives are increasingly connected, in my lounge alone I run an Ethernet switch with 6 devices connected to it. Recently I had to install a new Wireless router and with a new wireless key and update all of my ...
Blog Entry by Matthew R. Ellison | 02 Oct 2012 | 2 comments