Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

In SEPM when you're looking at the clients and you sort by IP address it does it in a totally ilogical way: When obviously what we want would be: 192.168.103.2 192.168.103.7 192.168.103.10 192.168.103.16  etc. ...
Idea by fred2k | 12 Nov 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
The Underground Economy, Pt. 8 Most people assume zombies are only fiction reserved for B movies and popular ...
Blog Entry by Tim G. | 08 Aug 2014 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments
Tips from the FTC on Fraud, Deception and Consumer Privacy It seems like every week another major company ...
Blog Entry by Matthew Nelson | 25 Apr 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments