symantec - News, Features, and Slideshows


  • Iris ID systems go mainstream

    Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.

  • Forget fingerprints: Your iris is your new identity

    At the entrance to The Vault, the most secure room within the most protected building operated by security services provider, Symantec, an iris recognition system stands guard as the last line of defense.

  • Applying Big Data approaches to information security a challenge

    Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.

  • Worst security snafus of 2012

    The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.

  • PDF files most trusted...and most targeted

    PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.

  • Free vs. fee: Free, paid antivirus programs

    Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to go with a freebie.

  • Inside Symantec's Security Operations Center

    The inside of the Symantec Security Operations Center looks like a scene out of the movie "War Games," and in many ways, the connection is fitting. The SOC, as it is known by Symantec employees, is in the business of detecting and analyzing network threats. And as malicious activity online gets increasingly more sophisticated, the war against cybercrime is definitely on.