Blog Posts Tagged with "Symantec"

Ba829a6cb97f554ffb0272cd3d6c18a7

Symantec Gets Pwn3d: The Fallout

January 06, 2012 Added by:Kevin McAleavey

YamaTough provided Infosec Island with compelling evidence that he did indeed have the secret sauce and planned to release it in order to embarrass Symantec over Indian government policies towards obtaining source code to eavesdrop on cell phones and other communications...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Is It Really the Norton AV Source Code?

January 06, 2012 Added by:Keith Mendoza

The best part, the archive file that YamaTough floated does not contain any code that does the actual scanning for viruses. That's the good news, now for the part that would keep me awake tonight if I were a developer in the Norton Anti-virus team...

Comments  (5)

6d117b57d55f63febe392e40a478011f

Symantec Confirms Norton AV Source Code Exposed

January 05, 2012 Added by:Anthony M. Freed

"Symantec can confirm that a segment of its source code has been accessed. Symantec’s own network was not breached, but rather that of a third party entity. We are still gathering information on the details and are not in a position to provide specifics on the third party involved..."

Comments  (21)

69dafe8b58066478aea48f3d0f384820

Update 3: Hackers May Leak Norton Antivirus Source Code

January 05, 2012 Added by:Headlines

YamaTough has posted more information from the alleged breach on Google+ in an effort to prove this is not a spoof, an excerpt is as follows...

Comments  (23)

6d117b57d55f63febe392e40a478011f

Update: File Appears to Contain 2006 Norton AV Source Code

January 05, 2012 Added by:Anthony M. Freed

Infosec Island has been provided with a file that appears to contain source code for the 2006 version of Norton antivirus. We have provided Symantec with the file and are awaiting their analysis. We will not be releasing the file due to the sensitive nature of the information...

Comments  (6)

296634767383f056e82787fcb3b94864

Symantec Still Selling Huawei Equipment to the DoD

December 19, 2011 Added by:Jeffrey Carr

"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Symantec: Anatomy of a Nitro Cyber Attack

December 13, 2011 Added by:Headlines

"They are sending targets a password-protected archive... which contains a malicious executable. The executable is a variant of Poison IVY and the email topic is some form of upgrade to popular software, or a security update. The most recent email brazenly claims to be from Symantec..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Infosec and Drugs

November 06, 2011 Added by:Javvad Malik

The report fails to clearly define is what is cybercrime. It appears as if everything from someone giving away their credit card information to a stranger via email through to getting infected by a virus on the computer is all scooped up into the big bucket of cybercrime...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Critical Infrastructure Protection Declines

November 01, 2011 Added by:Headlines

“The findings of this survey are somewhat alarming, given recent attacks like Nitro and Duqu that have targeted critical infrastructure providers,” said Dean Turner, director, Global Intelligence Network for Symantec...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Crime Explodes - But Few Take Action

October 20, 2011 Added by:Joel Harding

An attention grabbing report recently by Norton reveals that cybercrime nets more than marijuana, heroin and cocaine combined. Even worse, over 1 million people per day are victimized by online crime. In spite of this, 41% of us do not have adequate up to date virus or malware protection...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Son of Stuxnet - A Not so Melodrama?

October 19, 2011 Added by:Kevin McAleavey

Speculation about Duqu is that it's a precursor to another attack against embedded systems, and has been gathering information already about industrial systems, particularly engineering data and other design information...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Stuxnet II Found in the Wild - Dubbed “Duqu”

October 19, 2011 Added by:Headlines

“Duqu’s purpose is to gather intelligence data and assets from entities such as industrial control system manufacturers in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Symantec: Spammers Creating Fake URL Shorteners

May 25, 2011 Added by:Headlines

“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Releases MessageLabs April Intelligence Report

April 26, 2011 Added by:Headlines

As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Report Details the Evolving Threat Landscape

April 05, 2011 Added by:Headlines

"Stuxnet and Hydraq... represented true incidents of cyberwarfare and have fundamentally changed the threat landscape. The nature of the threats has expanded from targeting individual bank accounts to targeting the information and physical infrastructure of nation states..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »