Blog Posts Tagged with "Symantec"
Symantec: Chinese Connection to Attacks on Defense Contractors
January 27, 2012 Added by:Headlines
The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...
Comments (0)
Symantec: Too Many Doubts - Disable pcAnywhere Software
January 26, 2012 Added by:Pierluigi Paganini
"At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks," Symantec said in the white paper...
Comments (4)
pcAnywhere Source from 2006 Still Alive and Kicking
January 26, 2012 Added by:Keith Mendoza
Even if a complete software rewrite is done, it's not really a complete rewrite. Someone in the development team--usually the person who was working on the last version before the so-called rewrite--will copy parts of code from the old source code...
Comments (0)
The 2006 Theft of Symantec's Source Code - Response and Repercussions
January 26, 2012 Added by:Jeffrey Carr
Symantec has acknowledged that source code for multiple products was stolen in 2006. The worst part is that Symantec was clueless about the theft of its own source code for almost six years, which means that thousands of customers were clueless as well...
Comments (1)
The Death of Antivirus Software
January 23, 2012 Added by:Danny Lieberman
Who needs an anti-virus? If I have a solid operating system like Ubuntu 11.10, IP tables, good control of the services on my notebook and practice safe email, why should I add additional layers of content security and feed the Symantec stock price?
Comments (12)
Cyber Espionage: A Buzzword-Term Often Overused
January 23, 2012 Added by:Infosec Island Admin
The Cuckoo’s Egg”, which happened in 1986, is the first "documented” case of computer espionage that is not classified. Cliff Stoll was asked to look into an accounting error on a University system and ended up finding and tracking an asset for the KGB...
Comments (0)
Symantec: What Went Wrong?
January 19, 2012 Added by:Bill Mathews
Where the rubber meets the road: I am a firm believer that security systems should be able to hold up to open scrutiny but often I’m alone in that. If this code leak really makes Symantec’s software useless for securing systems I would contend they’re doing it wrong...
Comments (4)
Symantec: The Inconvenient Truth Behind the Data Breach
January 17, 2012 Added by:Pierluigi Paganini
Initially, Symantec spokesman Cris Paden said the hackers had stolen only the source code of Symantec Endpoint Protection 11.0 and Symantec AntiVirus 10.2, minimizing the seriousness of the breach. The situation has now changed dramatically...
Comments (0)
Symantec Hacked in 2006? Claim Raises More Questions
January 17, 2012 Added by:Headlines
Symantec now claims that the company's own networks were in fact breached back in 2006, leading to the loss of proprietary product data: "...an investigation into the matter had revealed that the company's networks had indeed been compromised"...
Comments (3)
Cyber Defense Weekly: Symantec, Stratfor and SOPA
January 16, 2012 Added by:Cyber Defense Weekly
Internet companies are contemplating shutting down their sites in a day of protest against the egregious SOPA; Japan has contracted with Fujitsu to produce anti-malware malware; Symantec's source code has been stolen by a group of Indian hackers associated with Anonymous...
Comments (0)
Hacker to Release Symantec's PCAnywhere Source Code
January 16, 2012 Added by:Anthony M. Freed
YamaTough, spokesperson for the hacktivist group “The Lords of Dharmaraja”, informed Infosec Island of plans to release source code for Symantec's PCAnywhere. The release is to be made prior to the threatened exposure of the full source code for the Norton antivirus...
Comments (19)
First Documented Case of Cyber Espionage?
January 15, 2012 Added by:Richard Stiennon
Thanks to a hacker group in India, Infosec Island has source material that demonstrates wide spread cyber espionage on the part of the Indian Government which the hackers may publish. This is a historically significant development for those of us who track cyber espionage...
Comments (12)
Exclusive: Interview With Hacker YamaTough
January 13, 2012 Added by:Anthony M. Freed
Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...
Comments (3)
Exclusive: Indian Intelligence Infiltrated US Government Networks
January 10, 2012 Added by:Anthony M. Freed
Infosec Island received sixty-eight sets of usernames and passwords for compromised US government network accounts which “The Lords of Dharmaraja” said were acquired from servers belonging to India’s Ministry of External affairs and the National Informatics Centre...
Comments (29)
Rim, Nokia and Apple Providing Government Back Doors
January 09, 2012 Added by:Pierluigi Paganini
Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...
Comments (9)
Symantec Norton AV Hack: Some Further Considerations
January 07, 2012 Added by:Pierluigi Paganini
The information was obtained by hacking India's military computer network. The Indian intelligence agencies were in possession of the source code thanks to an agreement with Symantec. The source code seems to be part of the Norton Antivirus version 2006...
Comments (0)
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?
- Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed
- 4 Ways Every Employee Can Play a Role in Their Company’s Security