Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrades.
Please accept our apologies in advance for any inconvenience this might cause.

Endpoint Security Blog

Showing posts tagged with Internet Security Threat Report
Showing posts in English
piero_depaoli | 01 Oct 2013 | 1 comment

Every day we’re bombarded with news about the latest data breach. Unfortunately, the headlines we all read confirm findings in Symantec’s recent Internet Security Threat Report: the threat from hackers is not only growing but evolving.  Today’s cybersecurity landscape requires more than antivirus; advanced malware protection requires up-to-date technology with the ability to stop unknown threats. In fact, Symantec’s research showed that 51 percent of threats blocked by Symantec Endpoint Protection were stopped by technologies other than antivirus in 2012. Clearly, AV alone is not enough, and neither is outdated protection.

For customers to truly leverage their full security investment, it’s imperative that they upgrade to the latest, most robust product...

Deirdre Sena | 05 Apr 2011 | 1 comment

Profit is Personal

This is the third Symantec Internet Security Threat Report (ISTR) I’ve had the privilege of launching and I’m always impressed by the depth of information and analysis the researchers and analysts are able to uncover in one report -- especially when the report is in addition to their primary responsibilities.  But, cybercriminals and malware authors do not seem to take vacations.

 

And neither do our researchers.

 

Known as one of the most comprehensive sources of Internet threat data in the world, the ISTR is both a bear and a treasure chest all at once.  The sheer enormity of numbers, data and content make this report quite a challenge to pull together, yet the reality it exposes about the threat landscape is filled with such incredible insight and deep understanding of such a wicked Web-based world.

 

Today’s report reveals many significant changes to...

Francis.deSouza | 28 Jan 2010 | 2 comments

Recent reports of cyber attacks on Google and other American companies have raised concerns about protecting the critical infrastructure of a company or a country against a coordinated, targeted cyber attack. The recent cyber attack on Google used exploits targeting zero-day client side vulnerabilities to insert a backdoor trojan called HydraQ into the corporate networks. The attack has drawn much attention to the viability of the United States’ critical infrastructure to ward off similar attacks in the future, perhaps on a broader scale. The concern around this issue is warranted, justified and echoed throughout the industry.

It is important to bear in mind that there are steps that can be taken right now by Congress – steps that have the support and involvement of the cyber security industry and other private sectors -- to address some of these concerns and further secure the United States’ critical infrastructure:

  • Pass the Federal...