Video Screencast Help

IM Manager

Results for IM Manager

Ready for another cool web application penetration test trick? In this installment we'll cover clickjacking, also known as "UI redressing". Clickjacking is an instance of the classic "confused deputy" problem, and occurs when ...
Blog Post by vkornacki | 22 Feb 2013 | 0 comments
Performing a web application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work penetration testers hone their methodology and develop efficient ways of applying their ...
Blog Post by vkornacki | 19 Feb 2013 | 2 comments
Information Technology is radically changing. We can wrap it in terms and buzzwords like cloud, mobility, BYOD, Web 3.0, but the reality is both the sum of and more complex than the names we give it. IT is no longer in the hands of the professionals. ...
Blog Post by PaulTobia | 12 Feb 2013 | 0 comments
I need a solution We are trying to determine the registration date for screen names registered in Symantec IM manager. There doesn't appear to be anything within the Admin/Reviewer ...
Forum Discussion by happyadministrator | 11 Feb 2013 | 0 comments
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Post by franklin-witter | 07 Feb 2013 | 0 comments
Symantec security response has posted a write-up about a new Android threat, Android.Claco (also known as SuperClean) that poses new challenges to security teams in a world of BYOD.  You can read about the threat here: ...
Blog Post by uuallan | 05 Feb 2013 | 1 comment
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Post by franklin-witter | 05 Feb 2013 | 0 comments
InfoWorld recently ran an interesting article discussing 5 signs that indicate you might be the victim of an Advanced Persistent Threat ( ...
Blog Post by franklin-witter | 01 Feb 2013 | 1 comment
There's a growing buzz in the industry about "who" should be responsible for encryption in the cloud from a user perspective.  As usual, the technology to do this is not the hard part – crypto is crypto is crypto, etc.  It's really ...
Blog Post by Phil Harris | 21 Jan 2013 | 1 comment
It is time for HIMSS' Annual Conference and Exhibition again.  This year in New Orleans, March 3 - 7.  And as that giddy excitement starts to build, it reminds me of nothing ...
Blog Post by David Finn | 07 Jan 2013 | 0 comments