Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
To create a SERT disc you have to logon to Symantec, give a key, download an iso, burn it to a disc, and add definitions or allow SERT to download them ( I have never been able to get the iso to see whether the program can update its own ...
Idea by bsmoltz | 01 Feb 2013 | 4 comments
On Tuesday, November 20th, routers, switches and servers across the Internet reset themselves (or attempted to reset themselves) back to the year 2000.  This sudden change was caused by a reboot of the time server at the US Naval Observatory.  Timing is ...
Blog Entry by uuallan | 26 Nov 2012 | 1 comment
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
Many of the security issues we see with desktops and laptops today can be explained by the fact that such end-point computing devices were never designed to be connected together. It was only with the arrival of affordable network cards, then operating ...
Blog Entry by GregDay-SecurityCTO | 05 Mar 2012 | 1 comment
Lets know about clickjacking which is nowdays a big challenge for security experts and due to this unsecure website are attacked and frauds are done. Clickjacking attacks are conducted by transparently overlaying some benign web element with some ...
Article by kishorilal1986 | 27 Jan 2012 | 19 comments
ITS Partner is looking to hire a few Symantec Security Consultants / Engineers.   Location West Michigan / Grand Rapids, MI Area. Job Summary This position ...
Blog Entry by Chad Dupin | 01 Jun 2011 | 0 comments