Video Screencast Help
Security Community Blog
Showing posts tagged with Endpoint Protection (AntiVirus)
Showing posts in English
Symantec Corp. | 21 Jun 2012 | 0 comments

The Symantec Endpoint Protection and Mobility Group (EMG) includes three product families with a total of 30 products. Identifying problems and improving the customer experience in such a large organization is difficult and complicated. This case study shows how EMG uses customer feedback to help it find and fix problems and significantly improve the overall customer experience with all of its product offerings.

A major release of Symantec Endpoint Protection (SEP) was launched last year to excellent reviews. SEP product managers can point to several reasons why it was so successful, but one stands out. “We put a tremendous amount of resources into the new version,” said an SEP Product Manager, “but the improvements were based on customer feedback. We couldn’t have done it without their help.” Each quarter, the Endpoint Protection and Mobility Group (EMG), which includes Symantec’s core security product groups, receives 3,000 to...

riva11 | 07 Jun 2012 | 0 comments

Here an interesting article based on a Cambridge University study,  In which languages are internet passwords easiest to crack?

DESPITE entreaties not to, many people choose rather predictable passwords to protect themselves online. "12345"; "password"; and the like are easy to remember but also easy for attackers to guess, especially with programs that automate the process using lists ("dictionaries") of common choices. Cambridge University computer scientist Joseph Bonneau has recently published an analysis of the passwords chosen by almost 70m (anonymised) Yahoo! users. One interesting result is shown below. The chart shows what percentage of accounts could be cracked after 1,000 attempts using such a dictionary. Amateur linguists can have fun speculating on why the Chinese do so well and...

BJT | 04 Jun 2012 | 0 comments

At this time, Flamer seems to have targeted only a few hundred organizations and individuals located in a small segment of the globe. But make no mistake; Flamer is important worldwide.  The complexity of the code within Flamer is on par with that seen in Stuxnet; arguably the most complex piece of malware Symantec has analyzed to date.  However the mission of Flamer is much different from that of Stuxnet, which was designed to deliver a payload that disrupted the systems it was targeted toward.  Symantec and others’ research indicates that Flamer, as of this moment; is purely focused on capture and exfiltration of sensitive information.
   
The good news for our public sector customers is that Symantec has protections in place to detect this threat (W32.Flamer). Specifically, we have:

  • AntiVirus, AntiSpyware, IPS component, Symantec Insight, and Heuristics detection and conviction measures in Symantec Protection Suite...
Mira Davda | 29 May 2012 | 0 comments

Augmented by broadband penetration smaller and emerging cities of India are exploring opportunities offered by the virtual world. This group of connected people and businesses has reached critical mass and is lucrative enough to be targeted by cyber criminals.

Indian Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with one in four bot- infections in India reported in such cities, reveals India findings of Symantec Internet Security Threat Report, Volume (ISTR) 17. Also, some cities that repeatedly appear in the list for origin of phishing in India - Ahmedabad,  Nashik and Coimbatore also figure in the list of bot-infections.  Botnets are networks of zombie machines that are used to perform sophisticated attacks  and conduct coordinated attacks. The presence of bot-infected computers in these locations indicates that they are being inducted as part of a network of compromised...

AR Sharma | 28 May 2012 | 5 comments

Just now 'The Flame', the most powerful malware till date has been identified. Again, we must say that calling 'The Flame' a malware is insult for 'The Flame'.

When security community can call Stuxnet- the first cyber weapon, then 'The Flame' should be called as first nuclear cyber weapon.

'Flame' is the 20 times more complex than Stuxnet. Antivirus companies took 6 months to analyze Stuxnet. Imagine how much time and effort would be required to analyze 'The Flame'

'Flame' is massive and most likely targeted for Iran and Isreal.

Once the PC is infected with 'Flame', it steals all info including password, traffic, image, audio and keystrokes.

In the group of malware, 'Flame' joins the elite club along with Stuxnet and Duqu.

'Flame' is the sophisticated attack toolkit. When fully deployed, it's over 20 Mb in size. Such a huge size is due to many different...

Chetan Savade | 17 May 2012 | 5 comments

Hello Everyone,

Auto-Protect includes a feature that is called Download Insight, which examines the files that users try to download through Web browsers, text messaging clients, and other portals.

Supported portals include Internet Explorer, Firefox, Microsoft Outlook, Outlook Express, Windows Live Messenger, and Yahoo Messenger.

Download Insight determines that a downloaded file might be a risk based on evidence about the file's reputation. Download Insight is supported only for the clients that run on Windows computers.

You can enable or disable Download Insight and change how sensitive Download Insight is to potentially malicious files. You can also specify the additional criteria that Download Insight uses when it makes a decision about a file. Use these settings to help control the number of false positive detections.

You might want to customize Download Insight settings to decrease false positive detections on client computers. You can...

Chetan Savade | 15 May 2012 | 0 comments

Hello Everyone,

Tips to improve performance, speed & security.

5 tips for PC health: Organize your folders, update Windows, run antivirus software

Working on a slow, disorganized computer can be frustrating. Read on for organization tips and guidelines to keep your PC on the right track using tools built in to the Windows operating system.

1. Organize your folders

2. Clean up your hard disk

3. Use System Restore

4. Keep Windows and Microsoft Office up-to-date

5. Run antivirus software and a spyware detection and removal tool

Reference : http://bit.ly/JywScP

Speed up your PC

A badly fragmented hard drive will bring even a top-of-the-line new computer to a grinding halt. Learn how a preventive maintenance plan can keep your Windows PC running smoothly and swiftly.

...

Chetan Savade | 15 May 2012 | 0 comments

Be Safe, Be Secure

Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.

Making a plan for what to do and what not to do, e.g., types of devices you need to secure and monitoring inbound avenues of threat infiltration and outbound avenues of confidential data exfiltration

Establishing detailed policies for what employees can and cannot do regarding webmail and social media access at work – taking into account employee morale as well as productivity

Deploying a multi-layered, multi-level defense that goes beyond traditional, separated defenses such as firewalls – which are largely ineffective against today's blended and targeted attacks

Symantec has released best practices/recommendation to protect data.

Security Response recommendations for Symantec Endpoint Protection settings

...

riva11 | 11 May 2012 | 1 comment

Every time you connect a new device to Windows, for example a USB drive , it stores many information details in the registry. It can be helpful remove old , unused or unwanted device drivers because Windows is searching for those hardware devices in every boot sequence. Also a best practice is about to clean everything out that you don't connect or use anymore to tidy things up.

The freeware portable tool USB Oblivion can be used to delete USB Registry Keys or clear the USB Registry of USB drives and CD ROMs that have ever been connected to a PC by removing USB registry traces.

Compatible with 32 or 64 bit versions of Windows 2000, XP, 2003, Vista, Windows 7. Features include the ability to run in simulation mode (test without making any registry changes) and to save a backup of the registry in case something goes wrong.

System requirements : Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 32/64-bit versions.

...

Sushanta | 03 May 2012 | 0 comments

Hi,

I want to implement Split Tunneling for VPN Users in my Enterprise. While I do that I do want to have a restricted policy for the VPN users when they are off network and connected remotely. At the same time I do want to have the same policy applied to the users when they are on the network directly from office location.

Please suggest me the best practices. If anybody has implemented in any of their companies. Please help.

 

Thanks,

Sushanta