Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

I. BACKGROUND: In mid-2009, W32.Changeup , was first discovered on systems around the world. Over the last few years, Symantec Security Response has profiled this threat , explained why it spreads , and shown how it was created .  ...
Blog Entry by Brandon Noble | 30 Nov 2012 | 15 comments
As a Security Response Liaison, I’m often asked for links to specific information that's available on our public website. Here is a simple list of the more common pages I use for reference.   File-Based Protection (Traditional Antivirus) ...
Blog Entry by Brandon Noble | 11 Sep 2012 | 0 comments
Greetings everyone. We are still getting a lot of questions about Symantec's coverage of the most recent Java 0-Day. I thought I would take a moment to jot down a list of our current coverage for this event, and hopefully save everyone some time ...
Blog Entry by Brandon Noble | 30 Aug 2012 | 7 comments
We have been seeing a recent wave of Trojan.Shylock variants with a lot of additional functionality than the older versions we have been used to. Initially, many of these variants are detected generically as Backdoor.Trojan or Trojan Horse, but our ...
Blog Entry by Brandon Noble | 23 Aug 2012 | 0 comments
Over the weekend, Microsoft and F-secure issued warnings about a new global threat called “Morto”, and The Internet Storm Center has been seeing a large spike in traffic on Port 3389. The spike looks to have been caused by the RDP (Remote ...
Blog Entry by Brandon Noble | 01 Sep 2011 | 0 comments