Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
Like all fathers in the world, I want the best for my children, including the ability to leverage the latest in technology. In today’s world, my children need to understand technology not only to be competitive in their education and careers but also in ...
Blog Entry by Guido Sanchidrian | 11 Jun 2013 | 1 comment
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
The Story So Far... This is the third in an informal series of illustrated articles about how admins (and end users) can best protect their mobile endpoints using Symantec Mobile Security 7.2 . (This is a cool Enterprise product aimed at ...
Article by Mick2009 | 28 May 2013 | 11 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
K1 Speed | Ft. Lauderdale Wed, 12 June, 2013 - 10:00 - 14:00 EDT Please join us for the next South ...
Event by Anonymous | 15 May 2013 | 0 comments
iGoat v2.0 ( https://www.owasp.org/index.php/OWASP_iGoat_Project ) is a program that demonstrates common iOS mobile application security weaknesses and their remediation.  There are other resources that show the use of this tool. One example, ...
Blog Entry by Michael D Smith | 13 May 2013 | 1 comment
Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
モバイルデバイスを対象にしたスパムメッセージについては 以前のブログ でもお伝えしました。昨年、電子メールによるスパムは前年比 66% にまで減少しましたが、逆にモバイルスパムは、それほどの大流行ではないまでも、しだいに広がりを見せつつあります。 現在、中央ヨーロッパで出回っているのは、「当選券」タイプのスパムです。筆者の知人も、わずか数日間で 8 人がこのスパムを受け取り、そのうち何人かは誘惑に駆られたものの、誰一人として引っかからなかったのは、さすがです。メッセージには、宝くじで 200 ...
Blog Entry by Candid Wueest | 21 Apr 2013 | 0 comments
We have blogged before about mobile spam messages, and while email spam declined in the past year to around 66%, mobile spam—although not yet that prevalent—is now gaining ground. Currently the “winning ticket” theme is making its rounds through ...
Blog Entry by Candid Wueest | 19 Apr 2013 | 0 comments