Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
I need a solution We installed one of the solution packs that included a policy called "Network Security".  There are predefined rules for hacker tools, keyloggers, and ...
This issue has been solved
Forum Discussion by RonCaplinger | 17 Dec 2013 | 3 comments
I do not need a solution (just sharing information) Just spreading the word about a webcast (broadcast earlier today) which provides a good overview of the current threat landscape: ...
Forum Discussion by Mick2009 | 03 Dec 2013 | 0 comments
  We all know that shared-folders are honeypots for viruses (specially worms). When such share is on SEP client exception-list it becomes a vector for the malwares. I suggest a flag when adding a folder-exception under centralized ...
Idea by FbacchinZF | 02 Dec 2013 | 0 comments
I need a solution We recently upgraded our development machines to SEP SBE 2013. Now, whenever we compile our source code, several of our DLLs are marked as containing the ...
Forum Discussion by DC Systems | 30 Nov 2013 | 3 comments
I do not need a solution (just sharing information) Security Response have recently blogged about a new threat called Java.Tomdep . This is a worm that targets Tomcat servers. ...
Forum Discussion by Mick2009 | 22 Nov 2013 | 3 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
Issue This document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and resetting your password.  ...
Article by torsten_knorr | 20 Nov 2013 | 1 comment