Video Screencast Help

Search

Search results

This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007. It contains the Enterprise Editions (EE) and Small Business Editions (SBE) RTM - Release To ...
Blog Entry by Chetan Savade | 27 Aug 2014 | 1 comment
最近、店頭レジ端末(POS)を狙う Trojan.Backoff という脅威が、米国で 1,000 社以上の企業に影響を与えていることが確認されました。Backoff は、感染先の端末からクレジットカードやデビットカードの情報を盗み出す機能を備えています。米国国土安全保障省は、Backoff がもたらす脅威を受けて 勧告を発行 し、規模の大小にかかわらずすべての企業に対して、使用している機器が POS マルウェアに感染していないかどうか確認するよう推奨しています。 ...
Blog Entry by Symantec Securi... | 26 Aug 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
A recently discovered point-of-sale (PoS) threat known as Trojan.Backoff has affected more than 1,000 US businesses and is capable of stealing credit and debit card information from infected terminals. The threat posed by Backoff has prompted ...
Blog Entry by Symantec Securi... | 25 Aug 2014 | 0 comments
Spying and violation of privacy are topics that never seem to be out of the headlines these days. Stories about mobile malware being used by governments and law enforcement agencies to spy on people (Finfish), smartphones coming off the ...
Blog Entry by John-Paul Power | 25 Aug 2014 | 0 comments
The New York Times has reported that the Department of Homeland Security has expanded its estimate of businesses affected by the Trojan.backoff Point of Sale malware. Over 1000 total businesses in the U.S. are reported to have been affected, up ...
Blog Entry by Solange Deschatres | 22 Aug 2014 | 0 comments
NIST has published draft guidelines ( Technical Considerations for Vetting 3 rd Party Mobile Applications (Special Publication 800-163) ) to help guide organizations on how to check over third party mobile apps before they allow them for use ...
Blog Entry by Hon Lau | 22 Aug 2014 | 0 comments
Contributor: Mark Anthony Balanza As a successful business sector, the automobile industry is an attractive target for cybercrime. The automobile industry is composed of a multitude of businesses ranging from manufacturers and sellers to ...
Blog Entry by Lionel Payet | 22 Aug 2014 | 0 comments
On-Demand Training for Symantec Endpoint Protection and Symantec's Full Product Portfolio Demand for cyber-security professionals is growing twice as fast as other IT ...
Blog Entry by Kari Ann | 21 Aug 2014 | 0 comments
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments