Phishing and Banking Trojan Cases Affecting Brazil
|
|
|
- Valerie Brooks
- 10 years ago
- Views:
Transcription
1 Phishing and Banking Trojan Cases Affecting Brazil Cristine Hoepers Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil Núcleo de Informação e Coordenação do Ponto BR Comitê Gestor da Internet no Brasil
2 The Brazilian Internet Steering Committee - CGI.br CGI.br is a multi-stakeholder organization created in 1995 by the Ministries of Communications and Science and Technology to coordinate all Internet related activities in Brazil. Among the diverse responsibilities reinforced by the Presidential Decree 4.829, has as the main attributions: to propose policies and procedures related to the regulation of Internet activities to recommend standards for technical and operational procedures to establish strategic directives related to the use and development of Internet in Brazil to promote studies and recommend technical standards for the network and services security in the country to coordinate the allocation of Internet addresses (IP) and the registration of domain names using <.br> to collect, organize and disseminate information on Internet services, including indicators and statistics
3 CGI.br and NIC.br Structure GOVERNMENT (Appointed) I. E. CIVIL SOCIETY (Elected) Executive Branch Administrative Support Legal Counsel Pubic Relations Domain Registration IP Assignment Studies and Surveys About ICT use Internet Engineering and New Projects W3C Brazilian Office 1 Ministry of Science and Technology (Coordination) 2 Ministry of Communications 3 Presidential Cabinet 4 Ministry of Defense 5 Ministry of Development, Industry and Foreign Trade 6 Ministry of Planning, Budget and Management 7 National Telecommunications Agency 8 National Council of Scientific and Technological Development 9 National Forum of Estate Science and Technology Secretaries 10 Internet Expert 11 Internet Service Providers 12 Telecommunication Infrastructure Providers 13 Hardware and Software Industries 14 General Business Sector Users 15 Non-governmental Entity 16 Non-governmental Entity 17 Non-governmental Entity 18 Non-governmental Entity 19 Academia 20 Academia 21 Academia
4 CERT.br Activities Incident Handling Coordination Facilitation Support Statistics Training and Awareness Courses Presentations Documents Meetings Network Monitoring Distributed Honeypots SpamPots
5 Agenda Overview of techniques used in the country Traditional phishing Malware enabled financial fraud from simple trojans to more sofisticated attacks
6 CERT.br Phishing Handling System Phishing URLs data donation MS IE, Firefox, Yahoo!, UOL, Trendmicro fetcher Download a copy of each phishing page Extract and store data in a DB Donate data to partners online cases refeed the system phishing data tester Update uptime Check status no status changed? closed cases archive yes no status is offline? validator IH manually checks the new status yes alert IH about the change We handle phishings hosted in Brazil or affecting Brazilian organizations
7 Traditional Phishing Statistics for Total Cases: 7959 Unique URLs: 7826 Unique SHA1s: Total Cases: Unique URLs: Unique SHA1s: 6330
8 Timeline - Brazilian Brands
9 2011 Timeline - International Brands
10 2011 Phishing Cases by Country Code (IP Allocation) 2010
11 Domains Where Phishing Pages Were Hosted hosting companies URL shortener
12 Average Uptimes for Phishing Pages
13 CERT.br Malware Handling System s trojanfilter Extract suspicious URLs from s URLs sm2av Select new malware from malware s list Send malware copy to each AV vendor that does not detect the malware yet with the malware copy malware files (confirmed) trojancheck Fetch and store malware candidate Using AV, confirm if file is really a malware Create a list with the confirmed URLs istronline add new URLs list entry IP, date, URL, AV signature notify Get IP contacts Create with the list entry data and a template Send notification asking to remove the malware with the notification Try to fetch malware in order to check if it is still online Update stats DB including the new date and status of the malware URL This system only handles malware targeted to Brazilian users and used for financial fraud
14 Malware Stats
15 Malware Cases by Country Code (IP Allocation)
16 AV Efficiency 2011 (time of discovery)
17 Case study with malware and phishing: CPEs compromised
18 The Problem with the CPEs Low-end CPEs (ADSL connections only) admin password exposed via web interface allow WAN management all with the same chipset bug fixed and reintroduced depending on the firmware version Bug is some years old
19 Password Visible via Web Interface
20 How the Attack Worked scan Find vulnerable CPE Change password Change CPE DNS Servers redirected to a page with links to a malware that disables banking protections DNS incorrectly resolves names for high profile sites Once the protection is disabled, DNS incorrectly resolves names for several banks (for short periods of time)
21 Late 2011 Statistics US 96% China 2% Ukrain 2% January 2012: more than 300k CPEs still infected 40 malicious DNS servers found
22 But not only Brazil Found during the investigation lists of compromised CPEs in Europe India Latin America
23 Attacks Still Going On (honeypots logs) # provides old password "pwdold", new password "pwnew! # and a confirmation "pwcfm"!! T 2012/03/20 05:34: : > x.x.x.226:80! POST /password.cgi?usrpassword=dnschange HTTP/1.1..! Content-Type: application/x-www-form-urlencoded...! username=3&pwdold=user&pwnew=dnschange&pwcfm=dnschange!!! # POST /dnscfg.cgi! # sets two DNS servers x.x.x.86 and x.x.x.191!! T 2012/03/21 16:46: : > x.x.x.69:80! POST /dnscfg.cgi HTTP/1.1..Authorization: Basic YWRtaW46YWRtaW4=.. Content-Type: application/x-www-form-urlencoded...! dnsprimary=x.x.x.86&dnssecondary=x.x.x.191! &dnsdynamic=0&dnsrefresh=0!!
24 Questions? Cristine Hoepers CGI.br - Brazilian Internet Steering Committee NIC.br CERT.br
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
honeytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
Development of an IPv6 Honeypot
Development of an IPv6 Honeypot Klaus Steding-Jessen [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center Brazil CGI.br Brazilian Internet Steering Committee
Preventing your Network from Being Abused by Spammers
Preventing your Network from Being Abused by Spammers Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet
Fraud and Phishing Scam Response Arrangements in Brazil
Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center
CERT.br: Mission and Services
CERT.br: Mission and Services Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ Conferencia
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 DDoS Atacks: Detection, Analysis and Mitigation Lucimara Desiderá [email protected] Klaus Steding-Jessen [email protected] Internet Governance in Brazil:
Incident Response and Early Warning Initiatives in Brazil
Incident Response and Early Warning Initiatives in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Insecurity breeds at home
Insecurity breeds at home - Vulnerabilities in SOHO routers Amrita Center for Cyber Security Amrita University Small Office Home Office(SOHO) Routers 2 Problem at hand No technology available to detect/prevent
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
The anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
The Brazilian Internet Steering Committee CGI.br Internet Governance Model in Brazil
ian Internet Steering Committee CGI.br Internet Governance Model in rev. July 2014 CGI.br - ian Internet Steering Committee NIC.br ian Network Information Center CETIC.br Center of Studies on Information
Quick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Cyber Security for Start-ups: An Affordable 10-Step Plan
SESSION ID: ECO-W03 Cyber Security for Start-ups: An Affordable 10-Step Plan David Cowan Partner Bessemer Venture Partners @davidcowan Acknowledgements Startups don't like friction to get their job done.
www.pwc.com How to effectively respond to an information security incident
www.pwc.com How to effectively respond to an information security incident Agenda Analogy Plan Preparation Incident Handling Overview Collect & Triage Investigation Containment Eradication Recovery 2 Are
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
User Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
Medical Device Security: The Transition From Patient Privacy To Patient Safety. Scott Erven
Medical Device Security: The Transition From Patient Privacy To Patient Safety Scott Erven Who I Am Scott Erven Associate Director Medical Device & Healthcare Security Security Researcher Over 15 Years
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Under the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
CERT-GOV-GE Activities & International Partnerships
CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and
ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.
Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages
How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
MONTHLY WEBSITE MAINTENANCE PACKAGES
MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
DNS RPZ in the Swiss NREN
DNS RPZ in the Swiss NREN First-hand experiences after half a year of productive usage Matthias Seitz [email protected] Tallinn, 25 th of September 2015 Agenda What is DNS RPZ? Timeline of the project
MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director
MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2 MALWARE ORIGINS Users bring it from home
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
ICT statistics production and policymaking in Brazil
ICT statistics production and policymaking in Brazil Measuring ICT penetration through indicators Alexandre F. Barbosa, MSc., PhD Cape Town, June 6 th 2012 CGI.br - Brazilian Internet Steering Committee
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Malware Monitoring Service Powered by StopTheHacker
Technical Resources Malware Monitoring Service Powered by StopTheHacker StopTheHacker Dashboard User Guide End User Version CONTENTS Introduction... 3 Account Activation... 3 How to Log into Your Account...
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1
Cymon.io Open Threat Intelligence 29 October 2015 Copyright 2015 esentire, Inc. 1 #> whoami» Roy Firestein» Senior Consultant» Doing Research & Development» Other work include:» docping.me» threatlab.io
Report on Cyber Security Alerts Processed by CERT-RO in 2014
Section III - Cyber-Attacks Evolution and Cybercrime Trends Report on Cyber Security Alerts Processed by CERT-RO in 2014 Romanian National Computer Security Incident Response Team [email protected] The
www.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
Rogue DNS servers a case study
Rogue DNS servers a case study Feike Hacquebord Forward Looking Threat Research, Trend Micro Cupertino, CA, USA [email protected] Contents Introduction to DNS DNS Changer Trojans Rogue
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
