Symantec Corporation

Type: Company
Name: Symantec Corporation
First reported 15 hours ago - Updated 1 hour ago - 3 reports

Fitness tracking goes under the security spotlight

SymantecThe wearable market is currently estimated be worth around $14 billion and it's on the way up. According to AB Research , by 2018 over 485 million wearable devices will ship each year.Fitness trackers are just one part of the market, but they're ... [Published CNET News - 1 hour ago]
First reported 4 hours ago - Updated 4 hours ago - 2 reports

No patch yet for zero day in Symantec Endpoint Protection software driver

A zero-day flaw in a software driver in Symantec’s widely used Endpoint Protection product may be tricky to fix.The flaw is contained in the Application and Device Control driver, which is in Endpoint Protection versions 11.x and 12.x, the security company ... [Published PC World - 4 hours ago]
First reported 7 hours ago - Updated 7 hours ago - 1 reports

SYMANTEC : Patent Issued for Method and Apparatus for Autonomously Managing a Computer Resource Using a Security Certificate

By a News Reporter-Staff News Editor at Computer Weekly News -- According to news reporting originating from Alexandria, Virginia , by VerticalNews journalists, a patent by the inventor MacKay, Paul Fredrick ( Provo, UT ), filed on August 25, 2008 , was ... [Published 4 Traders - 7 hours ago]
First reported 13 hours ago - Updated 13 hours ago - 1 reports

This Megatrend Company Has Strong Catalysts For A Turnaround

Summary Though lagging peers over the last few years, Symantec is a strong name in the cybersecurity megatrend and has the cash to reposition itself. An acquisition of a smaller peer in cybersecurity could help position in mobile or enterprise security ... [Published Seeking Alpha - 13 hours ago]
First reported Jul 30 2014 - Updated 13 hours ago - 9 reports

Zero-day flaws found in Symantec's Endpoint Protection

06:29 AM ET IDG News Service - Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company. The three flaws, ... [Published DailyMe.Com - 14 hours ago]
First reported 17 hours ago - Updated 17 hours ago - 1 reports

Symantec, CA Squirm Under DoJ's Unfair Pricing Allegations

The TV game show The Price is Right may be an entertaining diversion, but for federal information technology vendors, getting the price right in government contracts is serious business. Two major software providers recently found out how serious it can ... [Published E-Commerce Times - 17 hours ago]
First reported 18 hours ago - Updated 18 hours ago - 2 reports

Symantec's Gillett Says Biggest Cyber Threat Isn't What You Think

07/30/14 - 08:49 AM EDTNEW YORK ( TheStreet ) --Companies are collecting an ever-increasing amount of information on their customers via the cloud and mobile devices. Faceless cyber attackers are licking their chops at an opportunity to profit.Target's ... [Published TheStreet.com - 18 hours ago]
First reported Jul 29 2014 - Updated Jul 29 2014 - 2 reports

Neverquest trojan targets regional banks in Japan

Fraudsters using financial malware called Neverquest have now set their sights on several regional banks in Japan, according to researchers. In a Monday blog post , Symantec's security team revealed that a new variant of the banking trojan was in use, ... [Published SC Magazine US - Jul 29 2014]
First reported Jul 29 2014 - Updated Jul 29 2014 - 1 reports

Symantec (SYMC) Trading Near $24.14 Resistance Level

After closing Monday at $23.93, Symantec Corp (http://www.marketintelligencecenter.com/symbol/SYMC"SYMC) presents an attractive opportunity to get a 4.97% return in just 172 days, which is an annualized return of 10.56% (for comparison purposes only). ... [Published Individual.com - Jul 29 2014]
First reported Jul 29 2014 - Updated Jul 29 2014 - 1 reports

Justice Department pursues Symantec alleging false claims for computer software

The Department of Justice has intervened in a lawsuit against Symantec Corp., alleging Symantec submitted false claims to the United States on a General Services Administration software contract.Mountain View, California-based Symantec, which sells a ... [Published Business First of Buffalo - Jul 29 2014]
First reported Jul 29 2014 - Updated Jul 29 2014 - 2 reports

SYMANTEC : Green Teams present “Green Talks” - an Environmental Lecture Series

By Jaime Barclay , Symantec 's Corporate Philanthropy Program ManagerSOURCE: SymantecDESCRIPTION:This month marks the launch of the new environmental lecture series at Symantec , Green Talks. These lectures will provide an opportunity for Symantec employees ... [Published 4 Traders - Jul 29 2014]
First reported Jul 29 2014 - Updated Jul 29 2014 - 1 reports

Use Symantec Security Intelligence Insights To Protect Your Business Online

A recent Gartner study reminds us that with more companies harnessing data for a competitive edge, there are increased challenges to secure information and protect against data breaches or targeted attacks. So how are security vendors responding? In Symantec’s ... [Published Gizmodo Australia - Jul 29 2014]

Quotes

"AV is far from dead, it remains a useful and highly effective tool against malware. Good security is all about layering and not relying on a single technology or solution to protect your business from attackers" Blaeser concluded
Symantec's whitepaper, " How safe is your quantified-self (PDF) ", looks at the whole fitness tracking movement, from dedicated devices such as the Fitbit or the Jawbone, to apps that use a smartphone's inbuilt sensors, and through to programs that require a user to input information manually."
News editors obtained the following quote from the background information supplied by the inventors: "Embodiments of the present invention generally relate to a computer system security and, more particularly, to a method and apparatus for monitoring a computer system to detect self-propagating malicious software."
"An organization may employ several computing technologies in order to accomplish various mission critical operations within a computing environment. For example, a data protection system may be used to recover important data that has been corrupted or deleted. As another example, a cryptographic infrastructure (e g., public-key infrastructure and/or the like) may be used to ensure secure communications (e g., messages) between components of the computing environment (e g., between a server and a client)."

More Content

All (2463) | News (1418) | Reports (6) | Blogs (1004) | Audio/Video (3) | Fact Sheets (13) | Press Releases (18)
sort by: Date | Relevance
Long live AV [Published Biz Community - 15 mins ago]
‘Xiaomi is not spying’ explains Hugo Barra, but... [Published Daily Bhaskar - 49 mins ago]
Fitness tracking goes under the security spotlight [Published CNET News - 1 hour ago]
No patch yet for zero day in Symantec Endpoint ... [Published PC World - 4 hours ago]
No patch yet for zero day in Symantec Endpoint ... [Published Computerworld - Security RSS feed - 4 hours ago]
Symantec Endpoint Protection vulnerabilities en... [Published SC Magazine US - 6 hours ago]
Patent Issued for Method and Apparatus for Stor... [Published HispanicBusiness.com - 6 hours ago]
SYMANTEC : Patent Issued for Method and Apparat... [Published 4 Traders - 7 hours ago]
Cisco Secure Ops helps manage the Internet of T... [Published SearchNetworking.com - 9 hours ago]
Tor hints at possible U.S. government involveme... [Published CIO IT-Strategie für Manager - 10 hours ago]
EMC adds cloud gateway with TwinStrata acquisition [Published Ovum - 10 hours ago]
ADDRESS VIRTUAL SERVER BACKUPS AND BYOD [Published SearchCIO.in - 12 hours ago]
Tor hints at possible U.S. government involveme... [Published NetworkWorld - 13 hours ago]
The Four Horsemen of Disruption [Published Edelman - 13 hours ago]
This Megatrend Company Has Strong Catalysts For... [Published Seeking Alpha - 13 hours ago]
Your Jawbone can share your location and your f... [Published Yahoo! Finance - 14 hours ago]
Zero-day flaws found in Symantec's Endpoint Pro... [Published DailyMe.Com - 14 hours ago]
Symantec Endpoint Protection Exploitable Throug... [Published Softpedia - 14 hours ago]
Antivirus products riddled with security flaws,... [Published NetworkWorld - 14 hours ago]
Your Jawbone can share your location and your f... [Published GigaOM - 15 hours ago]
Your Jawbone can share your location and your f... [Published MocoNews - 15 hours ago]
Your Jawbone can share your location and your f... [Published GigaOM - 15 hours ago]
Your Jawbone can share your location and your f... [Published GigaOM Network - 15 hours ago]
Phishing: What Once Was Old Is New Again [Published Dark Reading - All Stories - 15 hours ago]
Michael Dell is funding this company to move su... [Published Venturebeat - 15 hours ago]
Microsoft's Similarities to Apple Will Be Its S... [Published TheStreet.com - 15 hours ago]
Microsoft's Similarities to Apple Will Be Its S... [Published The Street Latest - 15 hours ago]
Cybersecurity Startup Gold Rush for Venture Cap... [Published NetworkWorld - 15 hours ago]
Zero-day flaws found on Symantec Endpoint Security [Published MajorGeeks.com - 15 hours ago]
Information Lifecycle Management (ILM) [Published SearchCIO.in - 16 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
No patch yet for zero day in Symantec Endpoint ... [Published Computerworld - Security RSS feed - 4 hours ago]
A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix. ...
Your Jawbone can share your location and your f... [Published MocoNews - 15 hours ago]
It's not just your phone -- your fitness devices can be used to track your location as well, according to a new study from Symantec. Your Jawbone can share your location and your fitness app can leak your data originally published by Gigaom , © copyright ...
Your Jawbone can share your location and your f... [Published GigaOM - 15 hours ago]
It's not just your phone -- your fitness devices can be used to track your location as well, according to a new study from Symantec. Your Jawbone can share your location and your fitness app can leak your data originally published by Gigaom , © copyright ...
Your Jawbone can share your location and your f... [Published GigaOM Network - 15 hours ago]
It's not just your phone -- your fitness devices can be used to track your location as well, according to a new study from Symantec. Your Jawbone can share your location and your fitness app can leak your data originally published by Gigaom , © copyright ...
Phishing: What Once Was Old Is New Again [Published Dark Reading - All Stories - 15 hours ago]
I used to think the heyday of phishing had passed. But as Symantec notes in its 2014 Internet Security Threat Report, I was wrong! ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
Apple Buy Could Spark A Big Profit For Carlyle [Published Wall Street Journal Tech News Briefing - May 09 2014]
Stocks Decline But Notch Gains for the Week [Published Wall Street Journal What's News - Mar 21 2014]
TECH AM - The White House Tests a New Smartphone [Published Wall Street Journal Tech News Briefing - Mar 21 2014]
1

Press Releases

sort by: Date | Relevance
Global Storage Software Market 2014-2018: Key V... [Published Financial Services - Jul 18 2014]
Global Storage Software Market 2014-2018: Key V... [Published GlobeNewswire: Advertising News - Jul 16 2014]
SHAREHOLDER ALERT: The Law Firm of Levi & Korsi... [Published Financial Services - Jul 02 2014]
Morning Analysis on Active Equities -- Research... [Published Financial Services - Jun 02 2014]
Technical Notes on Active Equities -- Research ... [Published Financial Services - May 13 2014]
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.