Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hi today i am going to explain the thing that you have to know about SQL Injection. What is SQL injection  How it work   What is SQL injection: -SQL injection is attack vector in which attacker directly execute SQL query ...
Article by Vin32hack | 30 Sep 2012 | 0 comments
On 8'th June 2011, we had a World IPv6 Day where it was a 24-hour test that focused on websites.  Cathal Mullaney  posted a blog for the same.  --  https://www-secure.symantec.com/connect/blogs/brave-new-world-ipv6-day   To ...
Article by Aniket Amdekar | 06 Jun 2012 | 2 comments
Common Vulnerability Scoring System Introduction: The Common Vulnerability Scoring System is a rating system is designed to provide open and universally standard severity ratings of software vulnerabilities. It has been created for creating ...
Article by Aniket Amdekar | 24 May 2012 | 2 comments
Problem SEP SBE 12 RU1 clients are deployed in Console-managed mode with all components included. After deployment, all of components are active and on; definitions are implemented correctly. However, when launching ping of death attack ...
Article by Maciej_Jedrzejczyk | 11 Aug 2011 | 0 comments
This month Microsoft released an update for Windows to address three vulnerabilities in the SMB Server component. Two of the vulnerabilities are remote denial-of-service (DoS) attacks, while one (CVE-2010-2550) has the potential for remote code ...
Article by Aniket Amdekar | 10 Aug 2010 | 0 comments
Microsoft has released a security advisory (2286198) . The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut. ...
Article by Aniket Amdekar | 22 Jul 2010 | 1 comment