Symantec issued 2013 Norton Report, the annual research study which examines the consumersâ online behaviors, the dangers and financial cost of cybercrime. Symantec has released the 2013 Norton Report, the annual study of evolution of principal cyber threats in the security landscape. The study presented concerning results on the constant growth of cyber criminal activities. The 2013 […]
Rivers of words have been written on the popular Stuxnet virus, there have been many hypotheses, sometimes contradictory, about its paternity but the only certainty seemed to be the date of its creation, but suddenly the certainty as happens in the best thriller movies has been called into question. The authors of Stuxnet, the malware […]
The news is sensational as granted one of the most important journal, the New York Times has announced that during the last months it was victim of cyber espionage coordinated by Chinese hackers probably state-sponsored attackers. The attacks happened in concomitance with the investigation of the journal, published on Oct. 25th, that revealed that the […]
IT community become familiar with the concept of zero-day vulnerability, no matter if it is related to SCADA system or mobile phone firmware, it could allow a hacker to silently interfere with userâs life, exposing it to serious risks. This time the product affected by the vulnerability is produced by Symantec, it is PGP Whole […]
The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for backdoor trojan Makadocs, the security firm has in fact reported that a variant of malware hides its command-and-control (C&C) server communications using a legitimate Google Docs function. Backdoor.Makadocs is a Trojan horse that opens a […]
Here we are with the regular appointment with Symantec and its report on cybercrime ” The yearly Norton Cybercrime report“, a document that analyzes the evolution of cyber criminal activities and their impact on the society. The report covers different technologies including and social networking and mobile reporting the impact on final customers in economic terms. […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus infect a MAC pc? Is it possible to monetize a malware development? How is it possible? Obvious my answers, we cannot think of a software system free of bugs and vulnerabilities. To those who I have […]
Huawei – Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant It’s official, the joint venture between Symantec and Huawei Technologies is ended because the American IT security firms feared that the collaboration with the Chinese telecommunications producer could have a sensible impact on its business. […]
The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime and law enforcement agents who have acted to protect the company. Conclusion of the negotiation is that the precious […]