Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.

Search

Search results

Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone security to the forefront for enterprises and consumers alike. Due to ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments
Join Our Webinar May 14, 2014 Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, ...
Blog Entry by khaley | 05 May 2014 | 1 comment
A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats. Despite the ...
Blog Entry by vgtero | 02 May 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Many people visit websites and see some form of notification that signifies that the website that they are accessing has an SSL certificate. This can be represented as an encircled tick mark, which is representative of a particular company providing ...
Blog Entry by smartblogger | 16 Jan 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part ...
Blog Entry by Brandon Noble | 29 May 2013 | 0 comments
iGoat v2.0 ( https://www.owasp.org/index.php/OWASP_iGoat_Project ) is a program that demonstrates common iOS mobile application security weaknesses and their remediation.  There are other resources that show the use of this tool. One example, ...
Blog Entry by Michael D Smith | 13 May 2013 | 1 comment