Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Reality Check
Showing posts tagged with General Symantec
Showing posts in English
Ctrox | 18 Aug 2010 | 0 comments

“A perpetual tsunami.”
 
That’s how IDC describes the current growth of digital information throughout the world.1
 
It may be an understatement.
 
IDC estimates that last year, despite the global recession, the so-called “Digital Universe” grew by 62% to nearly 800,000 petabytes. (A petabyte is a million gigabytes.) This year, the Digital Universe is expected to reach 1.2 million petabytes.
 
Putting this explosive growth in context, IDC expects that by 2020, the amount of digital information will be 44 times as big as it was in 2009. 
 
And here’s another statistic to keep in mind: While the amount of information in the Digital Universe will grow by a factor of 44 by 2020, IDC estimates the number of IT professionals in the world will grow by a factor of just 1.4.
 
Clearly, big changes are coming. This Tech Brief looks at some of...

Ctrox | 18 May 2010 | 1 comment

Virtualization introduces new challenges into IT environments as they become increasingly both physical and virtual. Here are five in particular that you need to be aware of as you deploy – or continue to deploy – virtualization.

Has any topic attracted more attention than virtualization in IT departments these days? It’s not likely. Research bellwether Gartner Inc. has dubbed virtualization “the highest-impact issue changing infrastructure and operations through 2012.” 1
 
That being the case, it’s not surprising that virtualization introduces new challenges into IT environments as they become increasingly both physical and virtual. This Tech Brief looks at five key challenges that you need to be aware of as you deploy – or continue to deploy – virtualization.
 

  • Challenge #1: Can you manage both physical and virtual platforms efficiently? Management software and...
Ctrox | 26 Apr 2010 | 0 comments

Symantec has released its latest Internet Security Threat Report (ISTR XV).  The report is a recap of all of the threats posed to businesses and consumers in 2009.  The ISTR is a great tool for SMBs to use in educating their employees on the threats that are plaguing businesses right now.  In addition to highlighting the report’s trends, Symantec has put together a list of tips for SMBs to protect themselves against the malicious threats documented in the ISTR. 
 
 
Tips for how to Avoid Threats Described in the ISTR:
 
Threat: Credit card information was the most commonly advertised item for sale on underground economy servers known to Symantec for $0.85 to $30 per credit card number.
 
Advice for SMBs:Safeguard financial data:The numbers from Symantec’s ISTR XV show that more than ever,...

Swathi Turlapaty | 04 Feb 2010 | 28 comments

The early reviews are in, and it looks as if users who have made the move to Microsoft’s new Windows 7 are giving the operating system high marks.

In one survey conducted recently by Technologizer, more than 550 early adopters were asked to rate their overall satisfaction with the OS. Of all new Windows 7 users, 70% said that they were “extremely satisfied” and another 24 percent said they were “somewhat satisfied” with the operating system.

Reviews of the platform have tended to highlight the following capabilities:

  • Productivity features like Libraries and Federated Search accelerate housekeeping and other routine tasks so users can focus on contributing real value.
  • Security enhancements such as BitLocker and AppLocker isolate and protect critical information and system assets from theft, loss, and corruption.
  • ...
Ctrox | 27 Jan 2010 | 0 comments

There’s an old saying in security circles: Once something’s popular, it’s only a matter of time before the bad guys show up. The latest example: Twitter, the wildly popular microblogging site that lets you know what your friends are doing.

First came the phishing scams. Phishing “tweets” arrived last year in the form of direct messages -- essentially private texts that only Twitter friends can send and only you can see. Typically the message would say something like “Hey, check out this funny blog about you” with a URL attached. The link directed you to a site that looks exactly like the Twitter log in, only the address is twitter.access-logins.com/login/. If you fell for the trap and logged in, your Twitter name and password were captured.

The solution, according to Twitter, is simple. Don’t log in. If you suspect that your profile has already...

Ctrox | 14 Jan 2010 | 6 comments

Recently, Symantec convened a panel of researchers to review the 2009 threat landscape and to discuss what we can expect in 2010.

The group was unanimous in saying what we saw this year was ugly. Botnets prevailed and took over as a primary means of disseminating spam and spreading malware, while social engineering attacks became more sophisticated.

But the group was also in agreement in saying that what we experienced this year will pale in comparison to what 2010 will bring: “fast flux” botnets will dominate, rogue security software vendors will up their game, and fraud targeted at social networking applications will grow.

That’s the bad news. The good news is that with some preparation and the right security solutions in place, we can continue to outsmart the bad guys.

Here are the security trends that are likely to be noteworthy in 2010: 

  • Social engineering will be the primary attack vector –...
Ctrox | 11 Jan 2010 | 0 comments

The emails arrive bearing subject lines such as “State Vaccination H1N1 Program,” “Governmental registration program on the H1N1 vaccination,” and “Create your personal Vaccination Profile.” Purportedly from the Centers for Disease Control, the messages urge recipients to register for H1N1 vaccinations.

The problem is they’re bogus.

The messages lead users to an official-looking CDC site where they’re asked to create a profile in order to receive a vaccination for the swine flu. The site encourages users to download a vaccination profile archive and includes a link to the download.

Clicking on the link, however, actually downloads and installs a new variant of the “Zbot” Trojan horse. Called “Zeus” by some security companies, the malware is a bot Trojan that hijacks the Windows PC for nefarious activities, including sending out more spam.

It’s just the latest example of the way...

Ctrox | 11 Jan 2010 | 0 comments

Never at a loss to cook up new and ingenious scams, cyber-criminals are using increasingly persuasive online scare tactics to convince users to purchase rogue security software.

Rogue security software, also known as “scareware,” pretends to be legitimate security software but actually provides little or no value and may even install malicious code on a user’s computer.

According to the recently released Symantec Report on Rogue Security Software, there are two main ways in which rogue security software is installed on a computer: either it is downloaded and installed manually by a user after he or she has been tricked into believing that the software is legitimate, or it is unknowingly installed onto a computer when a user visits a malicious website.

Rogue security software is advertised in a variety of locations, including malicious and...