Video Screencast Help

Search

Search results

Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 43 comments
Following Security Bulletins have been released in July 2014: Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Recommendation for upgrade to LUA 2.3.2.110 Symantec Product Security has posted SYM14-005 Symantec LiveUpdate Administrator Unauthenticated/Unauthorized Account Access ...
Blog Entry by SebastianZ | 14 Apr 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by V4 | 03 Dec 2013 | 0 comments
Para acompanhar o que veio de novo nas versões 2.x LUA 2.3.0 2.3.0.71 foi a primeira versão 2.3. Este comunicado contém os seguintes aprimoramentos / otimizações: ·         Informações de configuração LUA pode ser exportado para um ...
Blog Entry by alsbalves | 22 Nov 2013 | 0 comments
I. BACKGROUND: In mid-2009, W32.Changeup , was first discovered on systems around the world. Over the last few years, Symantec Security Response has profiled this threat , explained why it spreads , and shown how it was created .  ...
Blog Entry by Brandon Noble | 30 Nov 2012 | 15 comments
Cyberspace presents an incredible amount of opportunity for today’s organisations. Connectivity, innovation, productivity and collaboration are just some of the benefits on offer. However, cyberspace presents equally significant risks. Those risks can ...
Blog Entry by James Hanlon | 15 Oct 2012 | 0 comments
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments