Video Screencast Help

Search

Search results

aka. Links to FREE Security Resources The best part of my job is when I get to talk to customers using Symantec Endpoint Protection. Like a moth to the flame, I’m curious about how our ...
Blog Entry by Kari Ann | 09 Sep 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
Celebrity lures continue in the world of phishing. We have seen several phishing sites in the past that used altered celebrity images to get users’ attention. Today, we have a couple of examples in which phishers continued their celebrity  promotion ...
Blog Entry by Avdhoot Patil | 26 Aug 2014 | 0 comments
On-Demand Training for Symantec Endpoint Protection and Symantec's Full Product Portfolio Demand for cyber-security professionals is growing twice as fast as other IT ...
Blog Entry by Kari Ann | 21 Aug 2014 | 1 comment
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Patch Available for Symantec Endpoint Protection 11.x and 12.1 The prevalence of zero-day vulnerabilities hit close to home this week when a North American penetration tester published ...
Blog Entry by Kari Ann | 07 Aug 2014 | 4 comments
Contributor: Virendra Phadtare Phishers are continuing to focus on social networks as a platform for their phishing activities. Fake social media applications in phishing sites are not uncommon. In the past, we have seen a bogus Asian chat app ...
Blog Entry by Avdhoot Patil | 01 Aug 2014 | 0 comments
Contributor: Mayur Deshpande Phishing emails masquerading as banking communications are observed in huge quantities every single day. Spammers will often exploit global news and major world events to carry out phishing attacks. Phishing emails ...
Blog Entry by Binny Kuriakose | 23 Jul 2014 | 0 comments
Following Security Bulletins have been released in July 2014:   Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809   What's new in LiveUpdate Administrator 2.3.3 ...
Blog Entry by SebastianZ | 14 Jul 2014 | 0 comments