Symantec

2013 Norton Report, the impact of cybercrime according Symantec2013 Norton Report, the impact of cybercrime according Symantec

2013 Norton Report, the impact of cybercrime according Symantec

Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost…

12 years ago
Stuxnet was dated 2005, Symantec discovered earlier version 0,5Stuxnet was dated 2005, Symantec discovered earlier version 0,5

Stuxnet was dated 2005, Symantec discovered earlier version 0,5

Rivers of words have been written on the popular Stuxnet virus, there have been many hypotheses, sometimes contradictory, about its…

12 years ago
Cyber espionage campaign against Americans news agencies – NYTCyber espionage campaign against Americans news agencies – NYT

Cyber espionage campaign against Americans news agencies – NYT

The news is sensational as granted one of the most important journal, the New York Times has announced that during…

12 years ago
Zero-day vulnerability in Symantec PGP Whole Disk EncryptionZero-day vulnerability in Symantec PGP Whole Disk Encryption

Zero-day vulnerability in Symantec PGP Whole Disk Encryption

IT community become familiar with the concept of zero-day vulnerability, no matter if it is related to SCADA system or…

12 years ago
Malware hides C&C server communications using Google Docs functionMalware hides C&C server communications using Google Docs function

Malware hides C&C server communications using Google Docs function

The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for…

12 years ago
2012 Norton Cybercrime report, a worrying scenario2012 Norton Cybercrime report, a worrying scenario

2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime " The yearly Norton Cybercrime report",…

13 years ago
Government cyber strategies to mitigate growing cyber threatsGovernment cyber strategies to mitigate growing cyber threats

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

13 years ago
Flashback Trojan, a business opportunity for allFlashback Trojan, a business opportunity for all

Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus…

13 years ago
Huawei – Symantec, broken join venture and the fear on chinese firmsHuawei – Symantec, broken join venture and the fear on chinese firms

Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei - Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant…

13 years ago

Symantec data leak, too many doubts on the assumption of extortion

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen…

13 years ago