Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

Symantec’s Email Submission Client enables end users to report suspected spam directly from their mailboxes to Symantec Security Response, which helps improve anti-spam research and results.  The Email Submission Client has been updated to support ...
Blog Entry by Janene C | 27 Mar 2015 | 0 comments
The clock is ticking... This is part two of a three part series discussing the end-of-life (EOL) of Windows Server 2003. As mentioned in  part one , on July 14th, 2015 Microsoft ...
Blog Entry by Digital_Kru | 09 Mar 2015 | 0 comments
Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 40 comments
Significant spike in malicious spam emails containing links, as attackers move away from attachments in their efforts to spread Downloader.Ponik and Downloader.Upatre. ...
Blog Entry by Jo Hurcombe | 16 Dec 2014 | 0 comments
Block targeted attacks via email attachments with Disarm technology through Symantec Messaging Gateway. In the ...
Blog Entry by piero_depaoli | 29 Oct 2014 | 0 comments
A Symantec observou uma campanha de spam envolvendo e-mails falsos de solicitação de transferência bancária. A técnica não é nova, e teve cobertura na imprensa este ano, mas houve um aumento neste tipo de spam ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Innocent-looking payment requests could result in financial loss for companies as finance department employees targeted with fraudulent emails. ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
New phishing campaigns mimic Facebook’s branding and display images of glamour models to lure victims. Celebrity ...
Blog Entry by Avdhoot Patil | 26 Aug 2014 | 0 comments
A fake Facebook website is behind a phishing campaign offering up the sex scandal video of Filipino TV host Paolo Bediones. ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments