Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Symantec Protection Suites (SPS)

Results for Symantec Protection Suites (SPS)

詐欺師がインターネットユーザーの気の緩みを狙うのは、特に驚くことでもありません。 シマンテックは、ホリデーシーズン後の数日間にわたって、新たにマルウェアが増加していることを確認しました。休暇が終わると、重要なメッセージを見逃していないかどうかを確かめるために、多くのユーザーがツールや電子メールを確認します。スパマーはそこを狙って、ユーザーが電子メール中の悪質なリンクをクリックすることに期待を掛けているのです。 ...
Blog Entry by Christopher Mendes | 16 Jan 2014 | 0 comments
Microsoft Security Bulletin On Tuesday the 14th of January Microsoft released the monthly Security Bulletin Summary for January 2014. The summary includes 4 Security Bulletins that cover altogether 6 CVEs - all are classified as important: ...
Blog Entry by SebastianZ | 15 Jan 2014 | 2 comments
After a long hiatus, spammers are once again using an old trick, where they attach a .zip file to trick the user into executing the compressed malware. The chart below shows the number of spam messages with .zip attachments over the last 90 days in ...
Blog Entry by Eric Park | 15 Jan 2014 | 0 comments
It’s not surprising to see scammers exploiting the laxity of Internet users. Symantec has observed another malware wave over the past few days following the holiday season. Many users check their utility and other official emails post-vacation to see ...
Blog Entry by Christopher Mendes | 15 Jan 2014 | 0 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
I need a solution 1 1387797013 You need to ...
This issue has been solved
Forum Discussion by Shwin23 | 23 Dec 2013 | 4 comments