Quantcast
Channel: Symantec Connect - Symantec Security Insights Blog - 博文
Browsing all 83 articles
Browse latest View live

Symantec Innovates Toward The Future of IoT

Having all of our useful belongings connected to the Internet could have great potential to make our lives easier; however, it also leaves us more vulnerable to security issues. Here's how Symantec is...

View Article



Criminal Motives Are Simple but Tactics are Crafty

The Underground Economy, Pt. 1 As underground hacking business booms, most of us have little to no visibility into what drives this black market in the cyber world. With this series, Symantec explores...

View Article

Apathy or Denial? Google Claims Security Unnecessary on Android Devices,...

Google's lead engineer for Android security recently announced that the majority of Android users don't need to install mobile security or antivirus, but Symantec and other security organizations have...

View Article

Cyber Shakedowns: A Hacker's New Payday

The Underground Economy, Pt. 2 Cyber extortion and ransomware are among the fastest growing criminal tactics. Sometimes the threats are real, and sometimes they are just a trick to get businesses and...

View Article

How Many People Profit From Stolen Credit Cards?

The Underground Economy, Pt. 3 We all know that a common form of information gained in data breaches from individuals and organizations is credit card numbers and verification credentials, but what...

View Article


Hacking as a Service: How Much Does it Cost to Hack an Account?

The Underground Economy, Pt. 4 How much does hiring an underground hacker cost these days? Symantec takes a closer look at Hacking as a Service (HaaS), and why the number of hackers has boomed in...

View Article

Beyond the Nigerian Prince: Modern 419 Scams

The Underground Economy, Pt. 5 Email scams that prey on people's sympathies are often called, "419 Scams", and have continued to be an easy and inexpensive way for cyber criminals to make money. We...

View Article

Hacking for Bitcoins

The Underground Economy, Pt. 6 While Bitcoins have been a popular cryptocurrency used to protect user identity in various transactions, hackers have found ways to exploit it, through mining...

View Article


Phishing Post Mega Breach: How The Loss of PII is Only the Start of Your...

The Underground Economy Series, Pt. 7 2013 was declared "The Year of The Mega Breach" by Symantec researchers, but what happens to personal information once it's stolen, and how can users protect...

View Article


Renting a Zombie Farm: Botnets and the Hacker Economy

The Underground Economy, Pt. 8 The most recent major data breach stealing 1.2 billion usernames and passwords was orchestrated using a botnet, a robot network of "zombie" computers, which, by being...

View Article

Mobile Attacks: Cybercriminals' New Cash Cow

The Underground Economy, Pt. 9 With more connected devices out there, hackers can reach people's information anyplace, anywhere. We look into the various schemes and techniques the cyber criminals use...

View Article

The Market for Online Credentials

The Underground Economy, Pt. 10 Online credentials are a hot ticket in the underground economy. 1.2 billion were stolen just this month by a Russian crime ring. So, how do these hackers cash in on...

View Article

Protecting Your Virtual Network

Virtual data centers are helping businesses become more productive and agile in today's changing world, but they are susceptible to cyber attacks. What is the best course of action to protect and...

View Article


What’s New in the Spam Market?

The Underground Economy, Pt. 11 Spam has been around for years, clogging up email folders with "junk" mail with links that lead to scam websites, or a download of malicious code. But the spam market...

View Article

Backoff Trojan Is Back: Protect Your Business From The Next POS Breach

The Point of Sale malware, trojan.backoff has been reported to have affected more businesses than was originally determined by the Department of Homeland Security. Find out the best way to protect your...

View Article


Image may be NSFW.
Clik here to view.

U.S. Banks Breached in Cyberattack: What Bankers Should Do To Stay Protected

At least five U.S. banks have been targeted in a sophisticated cyberattack this month. New York Times reported that hackers breached the network and stole gigabytes of sensitive information, including...

View Article

Bancos en Estados Unidos Afectados por Ciberataques: ¿Qué deben hacer para...

Por lo menos cinco bancos en Estados Unidos han sido blanco de una ola de sofisticados ciberataques en agosto. El periódico New York Times ha reportado que los criminales entraron a sus redes bancarias...

View Article


How To Prevent Your Data From Getting Shellshocked

Solutions To Protect Your Data Centers From The Bash Bug "An ounce of prevention is worth a pound of cure." - Ben Franklin. The Shellshock "Bash Bug", a vulnerability discovered last week affecting...

View Article

Dropbox User Credentials Stolen: A Reminder To Increase Awareness In House

Over seven million Dropbox users could have had their credentials stolen by an anonymous hacker. Data breaches and online thefts like this one are happening at alarming rates. How can businesses keep...

View Article

Image may be NSFW.
Clik here to view.

Los cinco virus más temibles, que aterrorizan computadoras en todo el mundo

¡Feliz Halloween! Te desea el equipo editorial de Symantec ¡Llegó Halloween! Esta época del año cuando fantasmas y monstruos salen a espantarnos aprovechando la oscuridad. Sin embargo a diferencia de...

View Article
Browsing all 83 articles
Browse latest View live




Latest Images