Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809 What's new in LiveUpdate Administrator 2.3.3 System ...
Blog Entry by SebastianZ | 14 Jul 2014 | 1 comment
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Microsoft Security Bulletin On Tuesday the 11th of February Microsoft released the monthly Security Bulletin Summary for February 2014. The summary includes 7 Security Bulletins - 4 are classified as critical; 3 as important: ...
Blog Entry by SebastianZ | 11 Feb 2014 | 0 comments
Microsoft Security Bulletin On Tuesday the 14th of January Microsoft released the monthly Security Bulletin Summary for January 2014. The summary includes 4 Security Bulletins that cover altogether 6 CVEs - all are classified as important: ...
Blog Entry by SebastianZ | 15 Jan 2014 | 2 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Dear Symantec, Please add more criterias to the Monitors/Logs/Log Type: Network Threat Protection/Log content: Attacks Page. A very important field is missing --> the Signature ID. It would help a lot when inspecting IPS events. ...
Idea by FbacchinZF | 31 Oct 2013 | 0 comments
SEP is an enterprise security sulotion.  In most envrionments this means there are many installations. CleanWipe is a tool that can be used as last resort when something went wrong and uninstall SEP when it is misfunctioning.  Great tool when in the ...
Idea by gpglang | 14 Oct 2013 | 0 comments