Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
Avkash K | 22 Oct 2013 | 0 comments

Hi All,

I just received one report on Conficker virus and lessons learned from the same which i thought of sharing over here.

This report is prepared by Conficker working group, and Symantec is a Conficker working group member.

This report covers the evaluation and detailed analysis of conficker virus.

Also you can find that how symantec has contributed in this fight against conficker.

Teresa Law | 21 Oct 2013 | 0 comments

The theme for week three according to the United States Department of Homeland Security focuses on the following:

Education: Highlighting the importance of cyber education and workforce development, including the advancement and opportunities in Science, Technology, Engineering, and Math (STEM) education.

Cyber Awareness should be a priority for everyone in their business and personal lives.  Cyberattacks and cybercrime are on the rise with ransomware and phishing schemes targeting us as we interact with each other online and targeted attacked toward businesses resulting in loss of intellectual property, reputation, or perhaps most distressing of all information about us (social security numbers, credit card numbers, etc.).

However, cyber awareness is not limited to protecting against cyber attacks.   Cyber awareness also means protecting ourselves and...

Teresa Law | 18 Oct 2013 | 0 comments

Governments around the world are using this month to educate industry and the public on the importance of cybersecurity.  As part of this year’s observance of Cybersecurity Awareness month, the United States Department of Homeland Security has identified a theme for each week of the month, based on a different cybersecurity issue.  The issue I’d like to focus on is:

Being Mobile: Online Safety and Security - Emphasizes the importance of cybersecurity no matter where you are or what device you are using.

Symantec is committed to helping organizations create a comprehensive and resilient security strategy and mobile security is a key component of that strategy.   The use of mobile devices continues to grow at an amazing rate and a staggering number of organizations now permit employee-owned devices to be used in the workplace.  This...

Avkash K | 17 Oct 2013 | 0 comments

Hi All,

Tor is buzzing word nowadays due to attacks on it's "Anonymity" by NSA.

In this article, i have just tried to cover up all the techniques & methodologies being used by NSA for taking down onto Tor users. These contents are based on my understanding of the Snowden presentations & other internet articles released in past days.

TOR”:  this is the buzzing word around the security evangelists nowadays, especially after Snowden revelations.

TOR Introduction: Tor (The Onion Router) was originally designed and implemented by U.S. Naval research laboratory keeping U.S. navy in mind. Primarily it was designed with the intent of having anonymity in the government communication. Today, it is used by huge variety of people for various purposes inheriting anonymity.

 But, nowadays integrity of “this” “anonymity” of Tor is under question for several...

Todd Y | 13 Oct 2013 | 0 comments

Whether we're discussing an employee with the desire to steal data for personal gain, fulfill a vendetta or they just don’t know better, the results are the same.  What's at risk is damage to brand, customer loyalty, revenue, pipeline, etc.   While the threat of a Malicious Insider is nothing new.  What is new or at least changing is the attack vectors and gaps in security being exploited.   An examination of the most recent breaches clearly shows they are becoming more frequent and more damaging.  

Take for instance the Snowden breach.  Snowden was a trusted insider who successfully circumvented some of the tightest security in the world and walked out of an NSA facility with a thumb-drive full of classified information.  The sexy story to tell would be that he is a world class spy or hacker that gained access to sensitive documents.  The reality is, he simply exploited the permissions and privileges he had...

Avkash K | 08 Oct 2013 | 0 comments

Hi All,

Just wandering over i came through one presentation by Dean Fox, VP, URS.

I really felt this would be very helpful to share this with you all to have the outlook of the today's cyberworld.

Also how the today's technology is contributing the same.

Any Security person must go through this article ones atleast.

Hope you all will enjoy this.

Thanks to URS for this.

Spencer Parkinson | 02 Oct 2013 | 2 comments

Information Security™ magazine and recently announced the winners of its 2013 Reader’s Choice Awards, which were selected based on feedback by customers who were asked to assess products deployed within their organizations. We’re excited to announce that Symantec was honored with eight awards – four Gold, two Silver and two Bronze –demonstrating significant representation across our diverse portfolio of market-leading security solutions.

Included below is a complete list of Symantec’s wins, which will be featured in the October edition of Information Security magazine and are highlighted online at

The Information Security magazine and 2013 Readers’ Choice Award winners were selected based on extensive, in-depth discussions and...

jjesse | 27 Sep 2013 | 0 comments

The Problem:

Currently within the DLP System there is no way to change a group of agents automatically, the only way is to do this manually through the Enforce Management Console. If you have a large number of agents this needs to be perfomed on it can be tedius. 

In the Management Console navigate to System -> Agents -> Overview and then select the computers you want and under the Actions menu you can change the Endpoint Server these computers communicate with.

Once again this is a bit tedious.

The Solution:

The update_configuration.exe file that is included in the file can solve this problem.  The update_configuration.exe file needs to be in the same location as the Endpoint Agent is installed.

To change the DLP Endpoint Agent server:

  1. Verify the update_configuration.exe file is in the same location as the agent installed
  2. Execute the following command:
riva11 | 20 Aug 2013 | 0 comments

A nice  resource to test your password is the website TestYourPassword. In a simply interface you can test your passord and see if a psword can be defined weak, good or strong.

In the main page you can find also a function to generate a new strong password and if you are interested to know how a password is cracked there is nice video to explain how hacker scan a network for weak passwords and crack them.


Link : TestYourPassword

See also the article : How to test your passwords