Video Screencast Help

Search

Search results

Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 38 comments
Significant spike in malicious spam emails containing links, as attackers move away from attachments in their efforts to spread Downloader.Ponik and Downloader.Upatre. ...
Blog Entry by Jo Hurcombe | 16 Dec 2014 | 0 comments
Block targeted attacks via email attachments with Disarm technology through Symantec Messaging Gateway. In the ...
Blog Entry by piero_depaoli | 29 Oct 2014 | 0 comments
A Symantec observou uma campanha de spam envolvendo e-mails falsos de solicitação de transferência bancária. A técnica não é nova, e teve cobertura na imprensa este ano, mas houve um aumento neste tipo de spam ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Innocent-looking payment requests could result in financial loss for companies as finance department employees targeted with fraudulent emails. ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
New phishing campaigns mimic Facebook’s branding and display images of glamour models to lure victims. Celebrity ...
Blog Entry by Avdhoot Patil | 26 Aug 2014 | 0 comments
A fake Facebook website is behind a phishing campaign offering up the sex scandal video of Filipino TV host Paolo Bediones. ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Phishing site claims to offer "unlimited chips" for Indian poker app. Contributor: Virendra Phadtare ...
Blog Entry by Avdhoot Patil | 01 Aug 2014 | 0 comments
Phishers posing as banks are redirecting victims to a fake website then requesting logon credentials in order to compromise bank accounts. ...
Blog Entry by Binny Kuriakose | 23 Jul 2014 | 0 comments