Video Screencast Help

Email Security.cloud

Results for Email Security.cloud

2 月は短い月ですが、興味をそそるスパムの材料には事欠かないようです。 バレンタインデーとそれを悪用する脅威 は過ぎ去りましたが、今度は 3 月 8 日の国際女性デーが狙われています。国際女性デーは、すべての女性に対して親愛、尊敬、厚意を表す絶好の機会ですが、スパマーもこうしたイベントを利用しようといつも目を光らせています。今回は、国際女性デーを狙って模造品を宣伝するスパム行為についてご報告します。 ...
Blog Entry by Anand Muralidharan | 26 Feb 2013 | 0 comments
February is a short month, but not too short for spam events to make an impact. Valentine's Day and its associated threats has passed, so now it is time for International Women's Day—celebrated on March 8 every year. This is a great ...
Blog Entry by Anand Muralidharan | 25 Feb 2013 | 0 comments
Ready for another cool web application penetration test trick? In this installment we'll cover clickjacking, also known as "UI redressing". Clickjacking is an instance of the classic "confused deputy" problem, and occurs when ...
Blog Entry by vkornacki | 22 Feb 2013 | 0 comments
Performing a web application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work penetration testers hone their methodology and develop efficient ways of applying their ...
Blog Entry by vkornacki | 19 Feb 2013 | 2 comments
Information Technology is radically changing. We can wrap it in terms and buzzwords like cloud, mobility, BYOD, Web 3.0, but the reality is both the sum of and more complex than the names we give it. IT is no longer in the hands of the professionals. ...
Blog Entry by PaulTobia | 12 Feb 2013 | 0 comments
多くの人が心待ちにしているバレンタインデーには、恋人どうしが愛情を確かめ合うために、そして意中の人に胸の内を明かすために、いろいろなプレゼントが行き交うことでしょう。昨年のこの時期には、 バレンタインデー を餌として利用するスパムが目立ちました。信じられないほど格安な宝石類、豪華なディナー、高価なギフト商品などが宣伝されていました。 今年も、バレンタインデーを悪用するさまざまなスパムメッセージが Symantec Probe Network ...
Blog Entry by Anand Muralidharan | 12 Feb 2013 | 0 comments
フィッシング詐欺師は、好んでユーザーの好奇心や不安を駆り立てようとします。その好奇心や不安から、人はつい警戒心を緩め、そうした詐欺を避けるために必要なはずの安全対策すら忘れてしまいます。 Symantec Probe Network で最近見つかったサンプルは、人間の好奇心をくすぐるタイプのスパムです。ユーザーは簡単に騙され、見知らぬ相手に重要な個人情報を漏らしてしまうかもしれません。この手の詐欺への警戒意識を高めるために、このフィッシング詐欺について詳しく説明します。 ...
Blog Entry by Mayur Kulkarni | 11 Feb 2013 | 0 comments
Most people are eagerly waiting for Valentine's Day. The day is an opportunity to spread affection and excitement amongst loved ones by exchanging gifts. Last year we observed prominent spam attacks using Valentine’s Day as bait. Messages ...
Blog Entry by Anand Muralidharan | 08 Feb 2013 | 0 comments
Phishers love to arouse curiosity and/or fear in the user’s mind and this stimulus can compel people to set aside all caution as well as  any safety measures they might have in place to avoid such scams. In a recent spam sample seen in our probe ...
Blog Entry by Mayur Kulkarni | 08 Feb 2013 | 0 comments
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments