Video Screencast Help

Search

Search results

Uma variação de 419 scam de e-mails está sendo usada por fraudadores para tirar proveito de casais desprotegidos que querem adotar um bebê. Cuidadosamente as vítimas são atraídas para um falso processo de adoção, que em seguida, solicita dinheiro ...
Blog Entry by Eric Park | 16 Apr 2014 | 0 comments
A variation on the 419 email scam is being used by fraudsters to take advantage of couples desperate to adopt a child. Once they are carefully lured into a fake adoption process, the victims are then asked for money to cover legal and administrative ...
Blog Entry by Eric Park | 16 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
    Hello and welcome to 2014! As we roll in the new year and with our individual list of resolutions make sure we put in protecting identity and securing our data as one of them with a firm commitment to actually carry out this ...
Blog Entry by Amit Chakrabarty | 13 Jan 2014 | 2 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 07 Jan 2014 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
I want a centralized dashboard solution that can give me visibility across my security environment. I currently have many Symantec tools in place along with some other desperate solutions, a unified dashboard tool would allow for easy reporting and ...
Idea by tr399 | 27 Nov 2013 | 1 comment
寄稿: Joseph Graziano ソーシャルエンジニアリングスパムの新たな手口として、ユーザーを欺いてコンピュータ上でマルウェアを実行させようとする巧妙な手法が出回っています。今回マルウェア作成者が使っているのは、ウイルス対策ソフトウェア企業からの電子メールに偽装する手口です。エンドユーザー各自で重要なシステム更新をインストールする必要があると説明したうえで、ウイルス対策ソフトウェアの修正パッチを装ったファイルが添付されています。この電子メールは、 Cryptolocker ...
Blog Entry by Symantec Securi... | 25 Nov 2013 | 0 comments
Contributor: Joseph Graziano A new clever way of social engineering spam is going around today that attempts to trick users into running malware on their computers. The methods malware authors are using include emails pretending to be from ...
Blog Entry by Symantec Securi... | 23 Jan 2014 | 0 comments