1. /
  2. Security Response/
  3. Risks/
  4. Remote Access

Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Remote Access

Programs that allow one computer to access another computer (or facilitate such access) without explicit authorization.
Subscribe
NameDiscovered
OSX.Remoteaccess 04/19/2010
IACommand06/23/2009
WS.RemoteAccess.303/27/2009
WS.RemoteAccess.203/27/2009
WS.RemoteAccess.103/27/2009
Remacc.RCPro03/11/2006
Remacc.ABSystemSpy01/19/2006
Remacc.MyShell06/10/2005
Packed.RemoteAccess11/15/2004
Remacc.SpyAnywhere09/17/2004
Remacc.Rics02/20/2004
Remacc.SAdoor12/29/2003
Remacc.Radmin10/14/2003
Remacc.RAServer09/19/2003
Remacc.Surveil09/10/2003
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
2014 Internet Security Threat Report, Vol 19