Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

This reuirement from customer we want to schedule the backup of Message Audit Logs from SMG to diffrent Location such FTP, HTTP or UNC. Schedule should be daily,weekly and monthly basis.   Agreed. At least put an Agreed. At least put ...
Idea by prime007 | 12 Nov 2014 | 1 comment
Innocent-looking payment requests could result in financial loss for companies as finance department employees targeted with fraudulent emails. Symantec has recently seen a spam ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
A Symantec observou uma campanha de spam envolvendo e-mails falsos de solicitação de transferência bancária. A técnica não é nova, e teve cobertura na imprensa este ano, mas houve um aumento neste tipo de spam ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
A fake Facebook website is behind a phishing campaign offering up the sex scandal video of Filipino TV host Paolo Bediones. Phishers are known for capitalizing on current events and ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Image stock spam, which can affect share prices and cause financial loss, has become more prominent in the last week. Image spam has been around for a longtime and peaked in January ...
Blog Entry by Sammy Chu | 26 Jun 2014 | 0 comments
The scam uses websites that pose as legitimate companies to trick people. On June 19, we came across an interesting e-card spam campaign. E-card spam typically distributes malware; ...
Blog Entry by Sean Butler | 23 Jun 2014 | 0 comments
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 4 comments
Una variación de la popular estafa cibernética 419 (419 email scam) está siendo usada por defraudadores electrónicos para aprovecharse de parejas desesperadas por adoptar un niño(a). Una vez que los interesados han sido cuidadosamente involucrados en ...
Blog Entry by Eric Park | 21 Apr 2014 | 0 comments
養子を熱望している夫婦を狙って 419 詐欺 のバリエーションを利用する、新手の詐欺が発生しています。その巧妙な手口に騙されて偽の養子縁組み話に乗ってしまうと、被害者は弁護士費用や行政手続き費用を支払うよう求められます。 最近の 419 ...
Blog Entry by Eric Park | 20 Apr 2014 | 0 comments