Video Screencast Help

Search

Search results

The clock is ticking... This is part two of a three part series discussing the end-of-life (EOL) of Windows Server 2003. As mentioned in  part one , on July 14th, 2015 Microsoft ...
Blog Entry by Digital_Kru | 09 Mar 2015 | 0 comments
Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 40 comments
Significant spike in malicious spam emails containing links, as attackers move away from attachments in their efforts to spread Downloader.Ponik and Downloader.Upatre. ...
Blog Entry by Jo Hurcombe | 16 Dec 2014 | 0 comments
This reuirement from customer we want to schedule the backup of Message Audit Logs from SMG to diffrent Location such FTP, HTTP or UNC. Schedule should be daily,weekly and monthly basis. Agreed. At least put an Agreed. At least put an ...
Idea by prime007 | 12 Nov 2014 | 1 comment
A Symantec observou uma campanha de spam envolvendo e-mails falsos de solicitação de transferência bancária. A técnica não é nova, e teve cobertura na imprensa este ano, mas houve um aumento neste tipo de spam ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Innocent-looking payment requests could result in financial loss for companies as finance department employees targeted with fraudulent emails. ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
A fake Facebook website is behind a phishing campaign offering up the sex scandal video of Filipino TV host Paolo Bediones. ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Image stock spam, which can affect share prices and cause financial loss, has become more prominent in the last week. ...
Blog Entry by Sammy Chu | 26 Jun 2014 | 0 comments
The scam uses websites that pose as legitimate companies to trick people. On June 19, we came across an ...
Blog Entry by Sean Butler | 23 Jun 2014 | 0 comments