25 Burst results for "Symantec"

Cyber Security News Round-Up January 19th 2021

The CyberWire

06:11 min | 6 months ago

Cyber Security News Round-Up January 19th 2021

"The threat actors who stole covid nineteen vaccine documents appear to have altered them before releasing them online. The european medicines agency says the material stolen. Ama says included internal confidential email correspondence dating from november relating to evaluation processes for covid nineteen vaccines. Some of the correspondence has been manipulated by the perpetrators prior to publication in a way which could undermine trust in vaccines emails about the vaccine development process. Where altered to give the appearance that this process was less credible than it might otherwise have been believed to be and ema standby the effectiveness and credibility of its reviews the corrupted alter data thus appear to have been emails about vaccine development and not data collected in the course of the development or evaluate of vaccines symantec reports another discovery in the salora gate threat actors armaments. Barium raindrop a back door used to drop. cobalt strike. raindrop bears some similarities to teardrop now where earlier identified as having been delivered by the sunburst back door both load cobalt strike beacon but raindrop uses accustomed packer. Cobalt strike raindrop also appears to be used to propagate across networks and may have been used selectively against high interest targets. Various sources are warning against seven vulnerabilities in the widely used. Dns forwarding client for unix based operating systems. Dns mask vulnerable. Systems could be susceptible to dns. Cache poisoning seven. Vulnerabilities are being collectively tracked. As dns spook jas off has a page up. Devoted to dna spook and users of affected systems are advised to apply patches as they become available on friday the us fbi renewed and updated a december warning about an iranian campaign. Enemies of the people intended to exacerbate us domestic mistrust and division by quote threatening the lives of us federal state and private sector officials using direct email and text messaging and quote. The operation also involves menacing dachshund. The bureau's warning says quote the iranian cyber actors have sought to intimidate some of the officials with direct threats including an image of an apparent text communication between the eeo teepee actors and an unidentified individual in the united states purportedly supporting the operation individuals. In the united states' intent on disrupting the peaceful transition of power potentially may be inspired by an act upon these influence efforts to harass harm threaten tack individuals specifically identified and quote enemies of the people represents an extreme form of this tendency and influence operations cyber scoop reports seeing a us intelligence assessment that claims russian and chinese services are using the capitol hill riot as an occasion for propaganda and disinformation. Those two nations styles have been consistent with that on display in past campaigns. Russian disinformation has been negative and disruptive concentrating on producing red meat conspiracy theories about the capitol hill riot. Chinese disinformation has been characteristically positive. That is not positive in the sense of or optimistic but positive in the sense of persuading its international audience of a particular position more accurately two positions. I the united states is a power in decline. And second this is what happens when you tolerate democratic demonstrations you get anarchy which is why in beijing's line. It's a good thing. They cracked down on hong kong at the end of last week. The fbi also issued a private industry notification warning of increased rates of fishing aimed at theft of corporate remote access credentials with a view to furthering privilege escalation. A common gambit is an invitation to log into a bogus. vpn page bleeping. Computer observes that this is the second such alert. The fbi has issued since the onset of the pandemic the fbi sees. This particular warning is calling out a new style of criminal activity quote. Cyber criminals are trying to obtain all employees credentials not just individuals who would likely have more access based on their corporate position. The alert says once they have some initial access even relatively lowly access. It's then the criminals task to work their way into other more sensitive precincts of the organization's network and finally the fbi is investigating whether pennsylvania woman identified as riley. June williams stole a laptop or a hard drive from. us speaker. nancy pelosi's office during the capitol hill. Riots with the intent of selling it to russian intelligence services. The washington post says. The suspect has now turned herself in and been arrested politico which broke the story over the weekend calls. The charges bizarre by which they mean startling not inherently implausible. The fbi says it was tipped off by a source identified only as a former romantic partner of the suspect. The ex-boyfriend as the new york times describes the tipster said that ms williams intended to sell the computer device to a friend in russia. Who then planned to sell. The device to svr vr russia's foreign intelligence service the transfer of the device to the russian middleman seems to have fallen through for unclear reasons if indeed there was any actual plan to do so and ms williams is believed to have retained the laptop in her possession. Investigation is continuing the laptop speaker. Pelosi's staff reported stolen is said to have been used only for presentations. But it's unclear. What if anything. Ms williams may have taken and what if anything hoped to turn over to the espn

European Medicines Agency FBI United States AMA Symantec Ms Williams Beijing Hong Kong Nancy Pelosi Capitol Hill Riley The Washington Post Pennsylvania Williams Russia The New York Times Pelosi Espn
Cicada: A Chinese State-Sponsored Advanced Persistent Threat Group

Security Now

07:06 min | 8 months ago

Cicada: A Chinese State-Sponsored Advanced Persistent Threat Group

"Cicada It was the group's use of the zero log on vulnerability that first brought them to my attention. But the more. I dug into the background of their existence. The more interesting they became they are Chinese state sponsored and sanctioned and a highly capable advanced persistent threat. We know that's a pt group Known by several names cicada a pt ten stone panda and cloud hopper. They've been involved in cyber espionage operations since at least two thousand nine there. Cyber intrusions are generally aimed at large international japanese companies with attack Presence having been spotted in seventeen geographical regions and across multiple business sectors. The anna's not just japanese companies because affiliates or subcontractors which may well not be japanese but are connected to japanese. Parents are also targets There are an advanced persistent threat because they burrow into a large companies network and remain in place performing long-term intelligence gathering the business sectors they focus upon seemed to primarily be automotive pharmaceutical and engineering sectors. As well as managed service providers the group uses what has become known as living off the land tools meaning using what's available on a network and they do have custom malware which has been observed in the their attack campaigns including a custom malware that semantic as named back door dot heart. Ip it h. a. R. t. i p. They have not seen it being used By the group previously but now they're seeing it everywhere so it's a recent addition to their arsenal Among the machines compromise during the attack campaign were domain controllers and file servers and there was evidence of files being exfiltrated from some of the compromised machines. The attackers extensively use a newer technique known as deal l. side loading in the campaigns that at semantic has an as observed And they were also seen leveraging. The zero log on vulnerability that was patched in august of two thousand twenty so as we know a few months ago. It's been patched control. Lots of corporations haven't updated their internal machines. Zero log on Is beautifully suited for moving laterally within an organization. And we know we. We recently did a deep dive into one of the ransomware attacks which exactly you know and specifically user a log on for that purpose This deal l. Side loading takes advantage of the windows so called side by side or win s x s system To trick windows into loading a malicious dll for an application when that application is run l. side loading is becoming an increasingly popular means for sneaking militias code inside of windows operating processes. You know getting it into ram And it's very effective in avoiding antiviral systems so it should be no surprise that the present campaign was first discovered when symantec observed suspicious de l. l. side loading activity on one of their customers networks that triggered an alert in semantics cloud analytics technology would just part of their Endpoint security that the symantec endpoint security offering the activity was brought to the tension of their analysts to verify that it wasn't a false positive then it was passed up to their investigations team for further analysis since semantics instrumentation is widely spread throughout. You know they're a large customer base. Wants the so called. The indication of compromise was identified. They were then able to apply that across their entire coverage space to identify other previously unknown victim networks and enterprises and begin through through the visibility that they had to get some sense for just how pernicious and widespread. This thing was also wants something like this is discovered. It's possible scroll back. Through prior activity logs to reexamine previous behavior. That wasn't appreciated for what it was at the time and to carefully examine the timestamps on files that they now know to look for which were not previously suspect. This allows them to german. How far back. An intrusion took place although the keta group is known to have existed since two thousand nine in this case this campaign has been ongoing since at least mid october of twenty nineteen And up through the beginning of last month. October of two thousand twenty. The attacking group has been active on the networks of some of its victims for a full year. The campaign is very wide ranging with victims in a large number of regions worldwide They have found compromised corporate networks in the us uk france belgium germany the uae. India china hong kong singapore vietnam the philippines taiwan south korea and japan so this one group is widespread

Keta Group Belgium UAE France Germany UK Hong Kong India Singapore China Vietnam The Philippines United States Taiwan South Korea Japan
Trickbot is Down But Not Out

Recorded Future - Inside Threat Intelligence for Cyber Security

06:17 min | 9 months ago

Trickbot is Down But Not Out

"So what are. What are the efforts. Been to take trick but down and how has how people running. That net responded one of the things that i sort of want to get ahead of two is. Our data suggests that This review campaign is not in re in response to trick takedown efforts. We saw domains Being registered in august for this campaign Certificates and servers being stood up a couple days prior to the first trick bought disruption Now i think it's a little silly to say that they're not related. You know if you're preparing to I guess engage with someone in a you know wreck your car or something like that. You're going to be more aggressive. I would imagine. But i don't think it's one to one trick Trick take downs led to this. The first of these A us government entity is alleged I don't know if anyone from that area or that entities confirmed but they pushed in a in a very clever way Pushed faked configuration updates to trick of victims effectively. Cutting them off from the botnets. Which was i think. I think it's been a little bit undersold. How cool that is. They were able. They knew enough about how this maller operated function. You know we're able to be their government entity They have the legal right to do this. Compromise at least some portion of their network and their infrastructure to then push these fake updates to effectively poison the their implants. It's fun it's funny calling it a takedown attempts because when it really did is severed ongoing intrusions to me is a little bit more effective If you have like a day to do something because we've seen over time is really really tricky cutting off current infections and buying those victims some time who knows how many more ransomware incidents we'd be looking at in late october early november had that not occurred And i think that that occurred on september. Twenty second in the next couple of weeks after that Microsoft put out legal proceedings that they basically went to a judge and got the rights to seize a trick dot command and control servers. Initially this was just in the us but microsoft's lawyers seem pretty good and they were able to sort of lead what what was an industry coalition Lumine and e set and symantec on. Fsi sack was also involved To push all that grab identified you know trick bots both tier one and plugging infrastructures. Which are sort of the initial communication and customer management infrastructure and then sort of The secondary infection management infrastructure to add plug ins move laterally etc. They were able to seize roughly ninety six percent of the botany of botnets command and control servers which turns out to be a pretty limited number. Compared say you know older or bigger botnets which again is they did this on a Pretty interesting Legal reasoning in that dietrich authors had abused microsoft trademarks in their code which is pretty unique and and it seems to be a clever legal way of being able to action against these actors and again i i know that some our industry have a sort of said that this effort hasn't been effective. I would argue that. It has taken down. I don't think that microsoft and e said these other companies have sat around and said you know try this. I think that it's a calculated move and so in in the wake of that you know. Obviously that probably meant a number of you know their control. command control. infrastructure is messed up for lack of a better term It probably meant a loss a number of infections and so from that. We've seen the botnets Battle back a microsoft themselves stated that odd they don't expect the botnets disappear they expect a fight and so we've seen trick Back to a command and control infrastructure. That wasn't taken down and some of their They've created more infrastructure but they're pushing it out at a much slower rate than they were before when they've been trying to spread and you know get new infections since this on predominantly through email spam they have at is another very very large. You know one. Of the most prolific spam senders in the world. They they sell access as a service and in a lot of instances. Since the trick takedown efforts began Email ted has been observed dropping trotz usually or historically there have been anywhere from thirty to forty servers embedded into trick bots configuration So it's an encrypted file that trick about reads once it executes on victim host and then tries to connect to one after another to see you know if any are online and then once they're online they sort of get instructions from there and then you go about their their evil business. What's changed is as a number of those servers have been taken off. Line the amount of services that we've seen included in every configuration has dropped significantly I think it dropped to a minimum of around twelve servers And then jump back up to around sixteen. The last time. I checked i was about two days ago. What's interesting about including all those servers is that it does tip to us. They at least that they have some amount of control left on the servers. They've they've played a little bit with the protocol that they use to communicate They've used Instead of traditional servers they've used a tour onion sites of the alleged dark web server not available Not accessible normal web browser but requires using a tour browser or a tour based connection to connect to it using that as a fallback command and control channel. And so it's been it's been pretty interesting watching them scramble. The sort of piecemeal their botnets back together.

"symantec" Discussed on KOA 850 AM

KOA 850 AM

01:45 min | 1 year ago

"symantec" Discussed on KOA 850 AM

"The gnomes electric on say a man was there to for example which should be very demeaning to compared to ours simple how did they cross over to get here well technically they are the level of energy they exist and it's called if Iraq I think we exist for us too so they're already here were coinciding it's just that humans consider the energy to be our health vitality we actually use it as a blueprint of our body was supposed to be made and so we use it for health purposes that's why we have healing energy or Dallas for example but they actually live in that energy is so nature spirits have a purple full purposeful part to play in our help because technically they built our bodies by making the atoms come together according to some plant like when you build up like a Christmas to your children you gotta put tabby in the slot eight type thing well they do the same kind of thing only they're moving minerals around Houston sober person list them I think like that so they have a part to play in our construction which is what they do in nature now building carrots for example or the elements so we have Symantec function I mean they help us but they are their own discreet life form interesting take on all of this I had you know we're is written read that it had been written that some leprechauns were nasty is that true well I mean I've got a question before and I don't find them to be nasty but I'll answer the question in two ways okay they certainly do have an attitude right I'm going to give them that but a lot of people that think they're connecting with leprechauns are also connection.

Iraq Dallas Houston Symantec
Intel stock up over 6% on earnings beat, outlook

CNBC's Fast Money

05:04 min | 1 year ago

Intel stock up over 6% on earnings beat, outlook

"Chip maker Intel spiking after hours let's get to John Ford at headquarters with all the details hey John we'll so well just listening to the call. CEO Bob Swanson I wonder bring you the latest there of course just to get the first details out of the way it was a beat on the top and bottom from Intel far and away they also raised their full year guidance by one point five billion dollars co Bob Swan on the call though right now talking about supply which has been a crucial issue for Intel they haven't had enough of it it's and frustrating for PC makers and others who have wanted to get more from Intel he did just say that they do expect increased output For q four that supply will be up double digits also single digits in two thousand twenty but still that is not enough and you said that they are letting their customers down right now with supply constraints and they've been unable to build out inventory now we have heard before that he's putting a little bit more color Intel's growth story I think it's more of the Bob Swan Manifesto on Intel's growth post krizelj talking about ai and the needs old custom built chips for ai pointing out that IDC says that in a couple years seventy five percent of enterprise applications are going to incorporate and so therefore when Intel can tune it's chips to artificial intelligence that makes them more valuable to customers that perhaps counters some of the apply issues and process technology issues that Intel has had allows them to have an argument that technology beyond just process could give them an advantage that will bolster gross margins perhaps Muslim all right John Thanks John Ford back at headquarters by the way we're going to hear from Intel CEO Bob Swan Tomorrow Morning at eleven am eastern time on Squawk Alley in the meantime on what your trade here well it's interesting that that was pretty bullish guidance right that was interesting to me that they would feel comfortable being that bullish really didn't need to because there's a lot of potential uncertainty out there in the next quarter so they must feel very very good and then the data center that was that was really really impressive so I think it's probably better to own here higher than it was this morning lower margin data center businesses I think still nicely the fact that Intel had been the last couple of quarters for Intel the outlook was not very good and and in fact there they threw a lot of cold water on the sector and a lot of people thought it was their their business which wasn't in some of the high growth businesses of the chip chain but but you have to be excited by by how these guys have essentially not only reaffirmed that they act you're seeing growth that maybe they have to kick up demand because the kickoff supply because demand is actually Barron expected but they talked about China and the impact and they haven't really seen a major impact I don't know if that means you should beaked fearful of the eventual but it's a relief for a company that I think people were certainly priced to the downside on this number data set beaten revenues by ten percent I mean that's a pretty big not Tim's point about margins that are all sudden makes operating margins close to thirty six percent which is significantly better than a suit was looking for twenty billion dollars eight percent so the market cap that's not insignificant that's one more thing and valuation to Cairns Point might be arguments probably cheaper now than it was a couple of hours into other chipmakers tell you very different store and now we have Intel and then you add that with your Taiwan semiconductor teradyne the positive ones so what's the message of the chips interview yet you're getting different stories right so I think it all really depends on what the end market is if you are in growing end markets you're going to do well so in videos a good example of one that we like and Marcus would be autonomous vehicles right you've got a data center gaming that's a great play we also so we bailed on they with their symantec acquisition thirty percent of their revenues are now going to be coming from software. I'll be quick takeaways if you've hooked your wagon alza group they've they've outperformed massively anything intact they've certainly massive massively up form the SNP Taiwan semi which is a essentially white labeled manufacturer for the industry is trading at all all time highs I think Taiwanese your biggest take on what's going on in his very impressive

Intel John Ford Ceo Bob Swanson Taiwan Twenty Billion Dollars Five Billion Dollars Seventy Five Percent Thirty Six Percent Thirty Percent Eight Percent Ten Percent
"symantec" Discussed on Marketing Trends

Marketing Trends

02:36 min | 2 years ago

"symantec" Discussed on Marketing Trends

"To your customers asked him about how they're using. The product and the stories will surface automatically. That's a great story because the unseen challenge that you're talking about which i get out roll. We'll add that in the show. Notes of <hes> was s cab or sipe sipe pab is i could see the the billboard ad it's like imagine being hacked on your company off site right like that sort of imagery is so powerful i could you imagine how frigging stupid you would feel if you know your c._e._o. Got hacked when knbr you're sitting at <hes> you're sitting at the cafe in <hes> you know in the middle of napa valley tonight that right like but that's a really crystal clear value prop crop that your customer might not know that you know other people use the customer are using. That's one of those things that i think it it doubles for prospects prospects and for customers 'cause those new use cases of like hey. Did you know some of our customers are using the product for this like that some of the best <hes> you know fodder for newell's so you can get yeah absolutely absolutely. What's your favorite campaign that you've ever done other than the the amazing <hes> the amazing in u._s._a. Today one all right. You put me in a tough spot by saying other than u._s._a. Today the other one. I think we did was <hes> back. In the days for a security company as well <hes> we ran a campaign called domain health check and that campaign was everyone should go visit a doctor every now and then and will visit how when was it last that you took your domain to a doctor ella sell that's the approach we took and we had a huge depositary of intelligence without you being a customer you just go put any domain name and i'll tell you if there are any email spam spam associated with your domain. Are there any bad websites associated with your domain so i'll give you a lot of intelligence even before you became a customer so that was a campaign in reading and they will graphics very cool other campaign <hes> sub campaigns associated with it and that resulted in i think two million dollars and quarterly pipeline without doing anything while how'd you how'd you promote it adds all stuff on digital age so on any replaces that people are reading about domain spam antivirus <hes> network security so we re stood digital art on the places. What about campaign..

newell napa valley u._s._a two million dollars
"symantec" Discussed on Marketing Trends

Marketing Trends

03:33 min | 2 years ago

"symantec" Discussed on Marketing Trends

"Website looked up one eight hundred number and called the one eight hundred number so doesn't happen. We got lucky. I should say yeah but i think that it's the same thing about better to be lucky than good. If you're creating something that actually does move the needle. I mean i think a lot of times people make you know we talked about like viral content lot and how it's like really hard to create something that goes viral but you have to engineer for success. We are talking about which is something that the everyday person is extremely worried about. There's a culture of people who are trying to find an exploit these boehner abilities and it's something that like we just all don't really know anything about cybersecurity so you know any any type of education like that that simple. It's very binary in her mind. It's like oh if being on wifi at times square is a really really bad idea. I'm not going to do it because i saw it from. You know this else piece of content. I got here. You're absolutely right and that is why today's show also found value which is why it became a three minute thirty second instead of thirty second segment and they went in two times scoring interviewed people. Have you connected to public wifi or you think about this so this actually became much bigger than what we were hoping from this and the other benefit benefit of this that came along that i'll tell you an is within four hours off the show earing. We got more number of downloads than the year before quiz and that is the only time that i actually the sky cody was based in israel. That was the only time my head of engineering called me at five a._m. Ruin what did you do. My my website is not able to keep up. I said make sure this is this is because of today's show is <unk> airing at seven forty eight a._m. In the east coast throw more servers added an hour from now and another hour from now because this is gonna happen every hour when they're airing at the same time in different geographies that they do and that's how we did human load balancing one minute before seven forty eight through many servers after the show. We took them away. Being a startup startup hacked to think about cost as well l. of that so stepping kind of out of that experience you're the c._m._o. Of growing startup yet acquired choir by symantec and now you have a massive company with a massive amount of opportunity the infrastructure marketing resources you not not not at not endless or anything like that but it's a much different from that that kind of start up chart up world how how did you go into the role that you're currently in with that same type of experimental mindset but now leveraging the additional resources and opportunities yeah but once you get acquired my one advice i'll have for the listeners is stick around and look for voyage every time that is a merger of two companies be small and big or big again <hes> small or of the two sizes there will be void created. It has happened multiple times in my career. Stick around and look for those opportunities when i joined. I was running running marketing for sky q. Then shortly after i started running strategic marketings all the shows that we do every content piece that goes for that shows. I started working on that. Then then i picked up product launches across all of symantec started doing that and now few months ago chosen doron global demand as well so my advice is stick around look look for pockets of <hes> empty spaces. If you may and graze hand keep on raising your hand don't run away from the fire..

symantec head of engineering engineer boehner israel doron thirty second three minute four hours one minute
Broadcom, Symantec And Eleven Percent discussed on News, Traffic and Weather

News, Traffic and Weather

00:12 sec | 2 years ago

Broadcom, Symantec And Eleven Percent discussed on News, Traffic and Weather

"A big decline today Symantec shares of the cyber security software company slid eleven percent in the wake of a C. N. B. C. report that talks regarding the Symantec acquisition by semiconductor company Broadcom had

Broadcom Symantec Eleven Percent
"symantec" Discussed on Daily Tech News Show

Daily Tech News Show

02:04 min | 2 years ago

"symantec" Discussed on Daily Tech News Show

"A semantic symantec with reportedly follow the pattern of that transaction operating more independence subsidiary although coming in with some cost cutting measures to basically help recoup their investment a little faster so you know i think everyone's like no symantec like okay that's security a why broadcom all of a sudden betting heavy on soffer yeah i think this is obvious that they're playing the game of monopoly i'm waiting for them fire literally by a railroad now the acquisitions from cannabis synergies perspective the other than obviously back office hr really don't make any sense the symantec a cia actually have competing products will what will have to get into that level of detail but this is a they're buying cash cash rich or cash positive companies for something bigger i don't know if they're gonna take another play at another ship manufactured is the part of their core business or they're just getting be stave off a being acquired themselves but this is obviously jesse financial plea then it is he want obama synergies or technology straps yeah and it's interesting the note that a couple of years ago intel tried to play like this when they acquired mcafee now they're playing wasn't to operate as a subsidiary they wanna do like integrated on a silicon level that basically floppy spun it out since then it kind of took a bath on that but i also think it's it's interesting in life that you know we were seeing the chip market kind of consolidate over the last couple of years and you know maybe you know all of be he uncertainty around while way in that situation is causing them to wanna have some other cashflow silicon either yup and then you have qualcomm so there you go yeah exactly exactly well yeah and let's see if they trained by each other again a next i saw this all over the place sony announced he w f one thousand x m three noise canceling wireless earbud it's another catchy name the buds used for microphones were active noise cancellation with each by connecting to the source audio over bluetooth five live resident having won by connecting unrelated to be other earbud.

symantec broadcom cannabis cia intel mcafee qualcomm sony obama
Should I buy Symantec Corporation

MAD MONEY W/ JIM CRAMER

00:48 sec | 2 years ago

Should I buy Symantec Corporation

"One of the big security software companies. They saw stock yet of this rate. Today's damn with twelve percent in the wake of a lousy quarter. And you know, what I'm a big believer in this theme. So even though it didn't report don't does next week. I am going to authorize buying Symantec on Monday. Okay. And that's because the terrific. Interim CEO Rick hill who has made us a ton of money. I don't know if you recall what he did when he sold novella Salamn research and on Monday at awesome, be a buyer of Cyprus stark. And why will that you Mocatta? He's the CEO and he's won over so many clients by showing them that works achilles heel. That's that's so called privileged accounts have access to everything and you need Sabra to protect these keys to the digital kingdom Bacardi's chilling sales pitches done wonders for the business.

CEO Rick Hill Interim Ceo Symantec Bacardi Sabra Cyprus Stark Twelve Percent
After a rollercoaster journey, he sold his tech company for $3.3B

The Tech Blog Writer Podcast - Inspired Tech Startup Stories

05:09 min | 2 years ago

After a rollercoaster journey, he sold his tech company for $3.3B

"Todd Davis is the founder of lifelock. An a quick Google search about him and his journey with lifelock. We'll tell you that Symantec famously acquired lifelock for over two point three billion dollars a few years ago, an equally Wikipedia will tell you that taught won the Ernest and young entrepreneur of the year for top emerging company for Orange County and desert cities in two thousand nine and he was also awarded the CRM's magazine service elite ward, the Arizona business leadership associations leadership award and the Arabs ONA business journal twenty-five most admired CEOs in two thousand nine book. None of these. We'll tell you how he faced death sat on the Cliff's edge. Not sure if he's company would exist the following month during the infamous roller coaster journey of startup life. So I caught up with him today to try and learn more about his personal story and hear about the thriving Texan here at Phoenix. And also what businesses setting up camp in the Grand Canyon state. So buckle up and hold on tight. So I. Beam your ears all the way to Phoenix Arizona. So you can join me

Lifelock Todd Davis Arizona Phoenix Google Symantec Grand Canyon Founder Orange County Wikipedia Three Billion Dollars
"symantec" Discussed on KUGN 590 AM

KUGN 590 AM

03:59 min | 3 years ago

"symantec" Discussed on KUGN 590 AM

"Get to imagine the twenty-first century and more fighting and cyber Patrick is the technology editor at defense one. We begin with an organization that has an obscure title that you would pass by in the Pentagon D. I you defense innovation unit. But it turns out it is now charged by the new director to take on the China monster, Patrick, a very good evening to you. I practice routinely reporting on China, and I use the word piracy just to make it a little more romantic. But it's my understanding that the Chinese pirates have taken all of the software and all of the patents for the hardware for these. Last decades is that going to stop have we got away of stopping them, given the new commander of the DIA, you good evening to you. Good evening. So it's an ongoing effort from that. The US government is paying more and more attention to now the Trump administration is attempting to modify aspects of the way that we make sure that other countries aren't transferring too, much intellectual technical capital to their shores, primarily Chinese and the Chinese government and intellectual property that has dual use value. So could be used for commercial or civilian applications, but also military applications and part of the push for that was a paper that was called the Pentagon paper, and it's authored by a fellow who's going to be the new head of his name's Michael Brown. And he's a former Symantec CEO, and it's a change in what this aspect of the Pentagon was supposed to do. It was stood up in two thousand fifteen by former Defense Secretary. Carter and it was meant to be the Pentagon's liaison to Silicon Valley. So it was stood up to bridge. Both the culture and the practical gap that exists between Washington DC and Silicon Valley to help the defense department really grab and harness all of the great innovation was coming out of the American startup scene. So what they call nontraditional players little tiny companies that are getting big VC money that produce things for the consumer world. The Pentagon says, you know, we're used to dealing with these big defense contractors that are great at building missiles, and ships, etc. But we really want to harness this innovation and so they stood up this office, and it's had a couple of different heads. But Michael Brown, the new head his kind of hold onto if you will is as former CEO of Symantec, and now as the head of DIA, you he's very focused. On reaching out to folks in Silicon Valley to help them understand a why they should be interested in working with the Pentagon. But also to highlight on Capitol Hill and within the Pentagon, the risks inherent in the increasing amount of Chinese investment in key sensitive technology areas that also occupied the startup scene, for instance, artificial intelligence, so it's a difficult process of trying to get a handle on on on this because it's not one that has a single easy solution on the one hand, you don't want to restrict venture capital money that these startups desperately need, but that's something that the government is paying more attention to and figuring out how to do it. The most recently passed national defense authorization act includes a provision to help the government change how it determines what sort of investments foreign companies and foreign countries like China and Chinese companies can. Make in US startups. But it's also an effort the DIA you is to help. Again. The defense department secure innovative technology solutions from non.

Pentagon US Michael Brown Silicon Valley China Symantec Patrick Chinese government editor director Washington commander Carter one hand
"symantec" Discussed on From Scratch

From Scratch

03:51 min | 3 years ago

"symantec" Discussed on From Scratch

"Hindawi co-founder of taniwha m- a cyber security company Tena ensures internet safety for the US government and fortune five hundred companies by spanning across entire networks and identifying intruders within fifteen seconds of their entrance. Clients include Amazon target best buy visa, and the department of defense Orion started Taneomi in two thousand seven with his father. David Pryor, father and son worked together on their other start-up. A software company called big fix that was sold to IBM in two thousand ten for four hundred million dollars. Welcome. How does he neom work? What we realized when we were working on big fix was that everybody in our space was doing things the same way. Really that design is called hub-and-spoke our in our model that essentially you've got a central server and in stock in every computer in the environment, and it's trying to gather data. And what we realized was having worked on that for ten years that we'd all reach them to the rope. And the problem is when you've got an attacker who's coming at you and they can get your data out in fifteen minutes, knowing that that happened three days later just isn't that valuable. I went our chief architect at the time and I asked her, what would we need to do to make our system thousands of times faster? And she essentially told me that we'd have to throw everything away and start over. So that's what we did. Our system is appeared appear system where you have all these computers next to each other talking to each other. And so there's sort of like this nervous system that then reports to the central brain or hub. Could you explain that further? We call it a ring topology. It's a very different design in our environment. Every client is talking to one ahead of them in one behind them. So they really only have two peers that they're talking to that allows us to control it much more effectively so you can throttle it. You can make sure that nobody's being hit very aggressively with traffic. It also allows us to secure it really effectively. You're talking before how the old system was broken this hub and spoke system, and I think of your competitors, your the incumbents, like McAfee and Symantec. They had these walls that try to prevent hackers from penetrating and your model is, let's let these intruders and, and then let's tackle them. Can you talk to me about the difference there? Sure. I mean in a perfect world, we wouldn't let anybody in the problem is the prevention model that McAfee Symantec and companies like that have promulgated historically was based on the idea that you could. Vent an attack because he'd seen it before. And the problem in our industry today is that attackers have gotten smarter. And as a result of that, the whole prevention model breaks down. What we've been able to do is create a system that gives you real time views on change so that when an attacker does come in before they're able to actually do damage, you often can see that they're in and change the environment so that it's impossible for them to cause damage and they are in and within, you know, fifteen seconds who claim you're able to change the environment. What exactly are you doing? How are you changing the environment? So one of the things that a lot of people don't know is that if you look at the attacks that are succeeding well over ninety, nine percent of them are being allowed in because of vulnerability. Everybody knows about. So Microsoft releases these patches every month. A lot of people don't apply them. And so we've seen is that with our tool, people can actually start doing all the things they knew they were supposed to do, but were really hard with old tool. So just in naval all the things. The hygiene that they've known for a long time they were supposed to do. And as a result of that, it makes it a lot harder for taxes to get in when they do get in, then you want to do things like quarantine computers, send a computer into a different part of the network so that it's not able to talk to your customer databases.

McAfee David Pryor Amazon US government Hindawi IBM Tena co-founder chief architect Symantec Microsoft fifteen seconds four hundred million dollars fifteen minutes nine percent three days ten years
"symantec" Discussed on WGN Radio

WGN Radio

01:46 min | 3 years ago

"symantec" Discussed on WGN Radio

"Your money on WGN here's orients, Hamilton stock market at the end of the first hour trading slightly higher the Dow industrial average up seventy five points the s&p five hundred up seven and the. NASDAQ up to volatility index down nearly a quarter of a point consumers stapled. Sector is helping Wall Street today, boosted by strong earnings, from crap, times the grant stock jumped five point seven percent after it top quarterly profit. And revenue estimates as, the bell cheese cheesemaker raise prices of its products Symantec down fourteen percent the biggest decline. Around the SNP after, the antivirus software maker lowered its yearly revenue forecast on the other hand dish Nine and a half percent after the satellite TV services provider reported a better than expected, quarterly profit. Then we. Turned attention to, agricultural trade today at the. Chicago Board of trade I. Look at the grain market the September week on drive, trading down two and three quarter cents a bushel nine fifty seven and three quarters but September corn up one and three quarters sensible trading at three sixty eight. And a half August soybean's down three and three quarter cents trading at eight. Dollars seventy eight and three quarter, cents a bushel livestock, futures trade, at the merkin diligence change mostly green on that screen the Tober lean hog..

Chicago Board of trade WGN Symantec three quarter three quarters fourteen percent seven percent
Chicago Board Of Trade, WGN and Symantec discussed on Steve Cochran

Steve Cochran

01:46 min | 3 years ago

Chicago Board Of Trade, WGN and Symantec discussed on Steve Cochran

"Your money on WGN here's orients, Hamilton stock market at the end of the first hour trading slightly higher the Dow industrial average up seventy five points the s&p five hundred up seven and the. NASDAQ up to volatility index down nearly a quarter of a point consumers stapled. Sector is helping Wall Street today, boosted by strong earnings, from crap, times the grant stock jumped five point seven percent after it top quarterly profit. And revenue estimates as, the bell cheese cheesemaker raise prices of its products Symantec down fourteen percent the biggest decline. Around the SNP after, the antivirus software maker lowered its yearly revenue forecast on the other hand dish Nine and a half percent after the satellite TV services provider reported a better than expected, quarterly profit. Then we. Turned attention to, agricultural trade today at the. Chicago Board of trade I. Look at the grain market the September week on drive, trading down two and three quarter cents a bushel nine fifty seven and three quarters but September corn up one and three quarters sensible trading at three sixty eight. And a half August soybean's down three and three quarter cents trading at eight. Dollars seventy eight and three quarter, cents a bushel livestock, futures trade, at the merkin diligence change mostly green on that screen the Tober lean hog..

Chicago Board Of Trade WGN Symantec Three Quarter Three Quarters Fourteen Percent Seven Percent
"symantec" Discussed on This Week in Tech

This Week in Tech

01:47 min | 3 years ago

"symantec" Discussed on This Week in Tech

"This is a, this is a current story, but it goes back in time in two thousand six. There was a election machine company that was putting remote access PC anywhere semantic product on their voting machines. These machines that voters used, these are the, she's the counted, the votes. So the fact that these machines were not only on the internet but had remote access offer running on them. Yep. Now this is really scary because PC anyway as bad as secure as an open front door. Well, that's what made me think of this because it turns out in that time from two thousand six, the PC anywhere source code had been leaked out to hackers, but semantic didn't tell anybody to twenty twelve. Well, let me ask you a question though. So I let me play devil's advocate, so I'm Symantec. I'm Cisco, whatever. What other way is there once you discover a vulnerability to get firmware to a consumer, like like my dad, right? Who is just not super tech savvy and you know, many people don't don't find it install updates on a regular basis. So isn't there a reasonable case to keep creating those back doors so that there's a way to ship the firmware updates will. The challenge should be that if you'll gonna make a product like that PC anyway was a budge to fixable. So these these election machines often made at a windows ninety five or windows. Thousand to two thousand six. So very likely something it was no remote access tools in the operating system, and you had to ply something off to the fact mar reading of the situation is those voting machines aren't used very often, and it was value country was at the time the number one voting machine maker in the big business. Like it's only like a tens of millions, it's not..

Symantec Cisco
"symantec" Discussed on Unfilter

Unfilter

01:48 min | 3 years ago

"symantec" Discussed on Unfilter

"One of these stupid flash maps that is constantly going on every time somebody's antivirus detects a cookie workstation screen screensaver yeah and then makes you think about that these must be like api feeds from like symantec and all these antivirus ex and like all the different like appliance companies they must be there must be different data agregation services that these maps are pulling from some sort of api and there is no indication of what what classifies as a cyber attack you just have different colors ryan you're supposed to be able to rock some sort of severity from that so it's really kind of funny looking at the way are do you think chris that there might be using our former color coded threat system you know red being the worst and blue young you're okay you're left to kind of soom be what it is like the the different sizes must represent the scale of the cyberattack as if it's a bomb so this expert who's got these maps up on screen because they look cool is going over a have i been ponce we're talking really low level stuff here and you're this we know we we could probably leave it's just it's just this is it's good information that needs to get out there but again i go back to we need to talk about it the right way there needs to be difference between security hygiene and actual attacks like we need to be distinctive in that now one story that kind of definitely perked my ears a bit was the f b i wanting to reboot are routers yeah and i i really wanted to to hear your thoughts on this because my mice spidey sense was like come on i mean really and i was just trying to really analyze this so let's let's take a look at the clip first and then we'll talk about right so.

symantec chris
"symantec" Discussed on The CyberWire

The CyberWire

02:02 min | 3 years ago

"symantec" Discussed on The CyberWire

"So there isn't sentence there for them to do that the only real case that we know that somebody was using it was actually discovered by symantec as part of a p t group that were running the inception framework is what they were calling it and the bad guys were basically storing malware on a web dev web service for distribution purposes so this is just where they store their malicious files so to hide their own tracks they had chained together multiple upn proxies so when they were interacting with the web service it would appear to be some person's home router you know some other ip and the reality is that before they even jumped through that ip they jump through multiple other upn proxy compromise devices to get there so it's kind of like that me muc on the internet you know good luck on behind seven proxies bryant that was literally what they were going for now if i'm the person who's router has been compromised sd would i know that anything was going on no you would have no clue there's no signs on the device so for upnp in general like i said it's it's an automatic device that's meant to be used by you know in an automated fashion from from one device communicating to another device there's it's not supposed to be a hands on human experience and because of that there's no way for humans to easily inspect audit or manage it straight out of the box if you log into your router and you start digging around and looking at your table first of all the only thing that's going to show up for you in your portfolio are the portfolios that you have put their anything that was injected into your net table as a port forward by the net damon or the upnp damon will not show up there there's not really a good interface for dealing with that i think there are some tools on windows that will let you kind of audit a upnp device.

symantec damon bryant
"symantec" Discussed on Skullduggery

Skullduggery

01:48 min | 3 years ago

"symantec" Discussed on Skullduggery

"I think that's a very live possibility and one that i want all of our you know our members to be paying attention to in that i think the us government should be painted you should tell us who your members are what what this europe is that you've that you've got the government so i am now the president and ceo of organization a nonprofit called the cyber threat alliance and we are made up of seventeen of the largest cyber security companies ranging from symantec and mcafee in palo alto and checkpoint and fortinet and cisco we have we run a platform that enables those companies to share threat intelligence on a daily basis at machine speed and we really seek to have our company's share that intelligence so they can have much greater awareness and improve their products and services for all their customers and clients and by the way that that job that you had cyber coordinator sometimes called the cyber czar one important dimension of that job as i understand it as being public facing being the person who interacts with the private sector because that's such a huge part of the equation absolutely yes yeah so you were the white house cyber coordinator if you came back into government now as the total the white house as total us government cyber czar and you could order anybody to do anything that you thought needed to be done give us the two or three things that that as are you would dictate or one of the things i definitely learned about being the cyber security coordinator as i couldn't order anybody to do anything so for the purposes of this exercise or giving you that power that's why does it the job's been eliminated.

europe president and ceo symantec palo alto coordinator us mcafee white house
"symantec" Discussed on WAAM Talk 1600

WAAM Talk 1600

01:37 min | 3 years ago

"symantec" Discussed on WAAM Talk 1600

"Bond index fund and black rock came out and was anti in ra antigun i don't need to be having any money in their funds and i let them know that and then another one i haven't heard back from these guys yet but it really makes me mad another one that that was anti in ra was norton symantec the company that does you know norton three sixty or some of the other internet and computer safety iris scanned by the way i know we got some brilliant people out there what's a good alternatives that there's the one that was i remember from years ago the mcafee virus mcafee virus scan there's a whole we're gonna find one that's not because once again i'm buying a virus scan product i'm not buying their politics and and these companies that do this would be well served to keep their politics out of their products bye bye bye bye so if there are people listening on what is this is is there a time shift dick still on now the two our trigger talk radio here wham talk sixteen hundred in ann arbor michigan we'll be back in a minute people are always on the move driving to work hauling the kids to practice how do they keep up to date they listened to wam talk sixteen hundred just like you if you're a business or.

symantec dick michigan ann arbor
"symantec" Discussed on KSFO-AM

KSFO-AM

01:36 min | 3 years ago

"symantec" Discussed on KSFO-AM

"To put trial where software on your computer de mcafee and symantec and other companies will pay del ten bucks say you know put this put here for ten bucks put this on cathy's computer 'cause in six months you know she'll have used up your free trial and we'll get money she will convert her to a customer but you don't want mcafee you don't want it so you want to uninstall it which means you're going to go in your control panel there's a program and features entry and you can uninstall it from there or you can even right click on the icon and your start menu and select uninstalled from the pop up menu and get rid of it the problem with antiviruses sometimes they don't fully uninstall they're trying to keep bad guys from on installing them so you may have to go to the mcafee site and get an installer there and this is one of the reasons i hate antivirus software i do not recommend it you have windows ten on your machine that has its own built in antivirus and i did i created it but i've never actually used it well there you go that block really really knock you out is that your husband laughing in the background is and he won't even he won't even learn how to use his smartphone.

mcafee cathy symantec six months
"symantec" Discussed on KFI AM 640

KFI AM 640

01:36 min | 3 years ago

"symantec" Discussed on KFI AM 640

"To put trial where software on your computer de mcafee and symantec and other companies will pay del ten bucks say you know put this put here for ten bucks put this on cathy's computer 'cause in six months you know she'll have used upper free trial and we'll get money she will be converted to a customer but you don't want mcafee you don't want it so you want to uninstall it which means you're going to go in your control panel there's a program and features entry and you can uninstall it from there or you can even right click on the icon in your start menu and select uninstalled from the pop up menu and get rid of it the problem with antiviruses sometimes they don't fully uninstall they're trying to keep bad guys from on installing them so you may have to go to the mcafee site and get an uninstall her there and this is one of the reasons i hate antivirus software i do not recommend it you have windows ten on your machine that has its own built in antivirus and i did i upgraded it but i've never actually used isn't that horrible you don't use antivirus he just sits there in the background watching as the windows or you never use the computer well there you go that block really really knocked you out now is that your husband laughing in the background but is and he won't even he won't even learn how to use his smartphone.

mcafee cathy symantec six months
"symantec" Discussed on KARN 102.9

KARN 102.9

01:56 min | 3 years ago

"symantec" Discussed on KARN 102.9

"On the facebook page and we can talk to you about your specific situation naturally you don't have to do everything minute one you can start in steps and do the most important things to get protected again most of this used to happen come downloads maybe even from legitimate sites but email such an effective mechanism now for people to perpetrate this and it's worldwide and it really doesn't which matter which email your system you're on although if you have pop up blockers turned on your browsers and you have a antivirus software solution that has some email anti phishing elements like the norton product does the symantec endpoint product does then you're safer than you would have been all right so in general though if along with ransomware we know there's other kinds of cyber threats and again the differences we used to be done with kids in a dorm room usually usually foreign but now we're dealing with organized crime and foreign actors and people of you know who have a financial interest in this activity so that's why we're seeing so much more about it what are some other things that you can do of course it's basically antivirus software keep your operating system up to date updates you're operating system if it's we under have an antivirus software that works in other words it's updating weekly sometimes multiple times a week if you've got a really oh version even though it's updating if you've got an older version of antivirus than getting a new version is worth it because it's they've built new things in the products improve over time they learn new things the other thing is in the firewalls that we sell we have a software element to.

facebook norton symantec
"symantec" Discussed on The CyberWire

The CyberWire

02:02 min | 4 years ago

"symantec" Discussed on The CyberWire

"Several significant bits of industry news breaking dark traces raised seventy five million dollars for a just shy of unicorn valuation of eight hundred twenty five million dollars dark trace has shown considerable ability to penetrate the lucrative us market and it also announced early today that it had concluded a strategic partnership with manage security services provider citic telecom cpc to gain traction in asia and the pacific risk lens has secured five million dollars in series a funding the equity investment was led by also venture partners with participation by paladin capital dealt technologies capital and kickstart high trust has also raised money some thirty six million dollars in series e funding from advance venture partners and has acquired data gravity for its data security solutions capability symantec has bought sky cure as a mobile security play along with last week's acquisition of fire glass a browser isolation shop the sky cure acquisition is expected to enhance semantics position in the end point protection markets finally starhub has announced that it will fully acquire cyber security firm sl for twenty six million singapore dollars the singapore telco already owned fifty one percent of a cell now it will have the whole shebang returning from commerce to crime and punishment the former head of bitcoin exchange mount gac's is about to go on trial on charges of embezzlement cryptocurrency traders and users hope the trial will have a clearing salutary effect on the market but cryptocurrencies are affording opportunities for crime elsewhere the south korean exchange bit thumb whose hacking we've been following didn't suffer embezzlement but it did sustain a breach of customer information apparently traceable to be weihou de gone bad and employees computer appears to have been compromised which then opened the door to compromise.

asia symantec mount gac embezzlement security services series a security solutions starhub bitcoin eight hundred twenty five mill seventy five million dollars thirty six million dollars five million dollars fifty one percent
"symantec" Discussed on StarTalk Radio

StarTalk Radio

01:32 min | 4 years ago

"symantec" Discussed on StarTalk Radio

"Listen you have internet and most likely you have a wi fi route or and if you have a round her that means cybercriminals could hack into your home network including wifi to access your credit card information that may be stored on your laptop or the family photos that are saved on your phone they could even tap into your baby monitor i know it's pretty creepy but guess what norton by symantec the leader in digital security for over thirty years has built a secure wi fi route or called norton core so at first glance this thing looks cooler than any router i've ever seen but don't be fooled underneath norton course stylists exterior is a powerful security tack that helps you turn your wi fi network into a digital fortress norton core discovers personal committed devices identifies vulnerabilities and help secure them if a devices breach core quarantines the threat norton core features parental controls that let you decide when and where your kids go on the internet norton core contains a one point seven good hurts do core processor to help you deliver a blazing fast speeds from the internet get the security you need and the speed you want with norton core go to norton dot com slash star talk to save thirty dollars if you pre order before july i that's norton dot com slash start talk.

home network wifi wi symantec thirty dollars thirty years