Video Screencast Help

Search

Search results

Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Sdesc | 15 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
Dear All, As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization ...
Blog Entry by kishorilal1986 | 17 Feb 2013 | 1 comment
  Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12.. When we had SAV in the market what our customer needed was just a Antivirus to protect ...
Blog Entry by Vikram Kumar-SA... | 05 Feb 2013 | 0 comments
Symantec received a finalist nomination in 9 categories of the upcoming SC Magazine 2013 Awards , representing Symantec's broad portfolio of superior security offerings. SC Magazine will announce the winners at a dinner event during RSA 2013. ...
Blog Entry by Pamela Reese | 06 Dec 2012 | 0 comments
On Tuesday, November 20th, routers, switches and servers across the Internet reset themselves (or attempted to reset themselves) back to the year 2000.  This sudden change was caused by a reboot of the time server at the US Naval Observatory.  Timing is ...
Blog Entry by uuallan | 26 Nov 2012 | 1 comment