Video Screencast Help
Partners Community Blog
Showing posts tagged with Emerging Threats
Showing posts in English
GRH | 02 Feb 2010 | 4 comments

This Blog Post comes from "View From the Bunker" - a blog about security and availability from some of the folk at Symantec. We will continue to check this blog and share its insights here regularly.

iPad’s domination of the news agenda has provided a golden opportunity for cybercriminals to target consumers hungry for more information on Apple’s new creation.

As soon as the announcement was made, we observed that related search terms had become targets for Blackhat SEO attacks and phishing attacks. People interested in finding out more about the iPad over the internet must be on guard. 
47197357_ipad-name-jobs-bod.jpg

The excitement over the iPad has been building for months now, so it’s only to be expected that its announcement would spark a huge spike in search traffic...

GRH | 21 Jan 2010 | 0 comments

A zero-day vulnerability recently identified in Microsoft Internet Explorer was used as an entry point for a coordinated set of cyber attacks that has been carried out on dozens of large enterprises. Please be advised that Symantec is working to keep our partners and customers informed of these cyberattacks known as Hydraq (also known as Aurora, Google Attacks, and the Microsoft IE Vulnerability (advisory number 979352)). The malware behind most of these attacks, "Trojan.Hydraq" appears to have been part of a sophisticated attack pattern designed to steal large amounts of intellectual property. Your customers may have become aware of this event from the heavy media coverage about the attacks on Google.
 
The underlying vulnerabilities used in this attack are now widely known and likely to be exploited by other cybercriminals even though the Command and Control infrastructure behind this coordinated attack has been taken down.

It is important...