symantec - News, Features, and Slideshows
- Regin is groundbreaking malware on par with Stuxnet, Symantec says
- Regin malware linked to attacks on Belgacom, well-known cryptographer
symantec in pictures
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
By Jeremy Kirk | 25 November, 2014 13:01
Regin, a complex and stealthy piece of espionage malware, steals passwords, logs keystrokes and can read, write, move and copy files, among other malicious activity, and has stunned the Symantec researchers that detailed it in a report.
By Tim Greene | 25 November, 2014 08:24
Malware that Symantec says was probably developed by a nation state may have been used for as long as eight years, a length of time that underscores the challenges the security industry faces in detecting advanced spying tools.
By Jeremy Kirk | 24 November, 2014 11:22
Symantec researchers have identified a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals since at least 2008.
By Nancy Weil | 24 November, 2014 07:55
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
By Lucian Constantin | 13 November, 2014 01:53
The new Apple-IBM partnership seems sure to help Apple sell more iPads to businesses, but it may also be setting off alarm bells at mobile device management companies large and small.
By Matt Hamblen | 17 July, 2014 02:57
Microsoft's board of directors wants to wrap up its search for a new CEO before the end of the year, according to Bloomberg, citing anonymous sources close to the action.
By Gregg Keizer | 10 October, 2013 20:24
At the entrance to The Vault, the most secure room within the most protected building operated by security services provider, Symantec, an iris recognition system stands guard as the last line of defense.
By Robert L. Mitchell | 30 September, 2013 14:33
Whitepapers about symantec
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- Pressure mounts in Europe for strict net neutrality
- Use Uber? Snapchat? Google Maps? Now Twitter knows
- Opera pitches all-you-can-eat app stores to mobile operators
- Apple-IBM products in November? Not quite
- Amazon's Fire sale: Phone is now just $199 unlocked
- PoS malware also targeting ticket vending machines and electronic kiosks
- Oracle, Oregon tussle over whether federal court should hear Cover Oregon case
- First robot, networked tablets head to West Africa to fight Ebola
- HP's former CEO Carly Fiorina explores GOP presidential run
- 5 ways to tell a cloud poser from a cloud pro
- EU wants Google to apply 'right to be forgotten' delistings to global .com domain
- What to consider when negotiating a hybrid cloud SLA
- US lawmakers to Europe: Don't break up Google
- Mozilla unveils search tool tweaks in next week's Firefox 34
- Hacking Team surveillance malware masquerades as legitimate bookmark manager