{"id":407,"date":"2012-03-15T11:48:47","date_gmt":"2012-03-15T11:48:47","guid":{"rendered":"http:\/\/blogs.silicontechnix.com\/?p=407"},"modified":"2012-05-12T01:29:12","modified_gmt":"2012-05-12T00:29:12","slug":"dont-use-our-software-security-firm-symantec-warns-customers","status":"publish","type":"post","link":"https:\/\/blogs.silicontechnix.com\/?p=407","title":{"rendered":"Don&#8217;t use our software, security firm Symantec warns customers"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>After loosing&nbsp; Norton AntiVirus Corporate Edition source code in 2006, now Symantec is asking its customer to stop usage of Norton\/PcAnywhere which was also leaked on Internet.<\/p>\n<p>The security firm said the theft occurred in 2006, compromising 2006-era version of Norton Antivirus Corporate Edition, Norton Internet Security and Norton SystemWorks and most important &quot;<strong>pcAnywhere<\/strong>&quot;, which could allow malicious users to gain complete access to systems and data very easily.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"235\" data-attachment-id=\"419\" data-permalink=\"https:\/\/blogs.silicontechnix.com\/?attachment_id=419\" data-orig-file=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1.jpg\" data-orig-size=\"390,235\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"symantec\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1-300x180.jpg\" data-large-file=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1.jpg\" alt=\"\" class=\"alignnone size-full wp-image-419\" src=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1.jpg\" style=\"width: 176px; height: 106px;\" title=\"symantec\" srcset=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1.jpg 390w, https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2012\/03\/symantec1-300x180.jpg 300w\" sizes=\"auto, (max-width: 390px) 100vw, 390px\" \/><\/a><\/p>\n<p>Also it is intresting to add that the guy who hacked that code also released source code of Indian Spy software&nbsp;<\/p>\n<blockquote>\n<p>&ldquo;So far we have discovered within the Indian Spy Program source codes of a dozen software companies which have signed agreements with Indian TANCS programme and CBI&rdquo;<\/p>\n<\/blockquote>\n<p>What does that mean? Indian agencies are doing signed agreements for spying using Symantec\/Norton products and others???? must be those agreements are not in favor of Pakistan \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>&quot;The headline is very embarrassing to Symantec,&quot;<\/p>\n<\/blockquote>\n<p>Anup Ghosh, founder and CEO of Virginian security firm Invincea, told FoxNews.com at the time.<\/p>\n<blockquote>\n<p>&quot;But this has now become the normal in securities. Every single corporation is susceptible to threats.&quot;<\/p>\n<\/blockquote>\n<p><strong>hahahah, very funny!!!!<br \/>\n\t<\/strong><\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>&ldquo;Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks,&rdquo; <a href=\"http:\/\/www.symantec.com\/connect\/sites\/default\/files\/pcAnywhere%20Security%20Recommendations%20WP_01_23_Final.pdf\">the company wrote in an online statement<\/a> about the hacking.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>The &ldquo;The Lords of Dharmaraja&rdquo;, the hacking group who authored the Pastebin note, has released the code online(last week).<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Some security tips from (Ira Victor, a security expert in Nevada):-<\/p>\n<p>1. Do not use a &quot;suite&quot; of security protection from any one firm. A mixture of best of breed security is more secure.<\/p>\n<p>2. Usernames and passwords alone are not enough protection for remote access. A single-use password system makes unauthorized remote access exponentially harder for cyber criminals.<\/p>\n<p>3. Do not run computers in &quot;Administrator&quot; mode. Run systems in &quot;User mode&quot; so that malware does not install automatically.<\/p>\n<p>4. Businesses should deploy application &quot;whitelisting.&quot; This will prevent unauthorized malware from running on computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; After loosing&nbsp; Norton AntiVirus Corporate Edition source code in 2006, now Symantec is asking its customer to stop usage of Norton\/PcAnywhere which was also leaked on Internet. The security firm said the theft occurred in 2006, compromising 2006-era version of Norton Antivirus Corporate Edition, Norton Internet Security and Norton SystemWorks and most important &quot;pcAnywhere&quot;, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"yes","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[140,164,17,95],"tags":[182,56,52,181,146,480,180],"class_list":["post-407","post","type-post","status-publish","format-standard","hentry","category-discussion","category-internet","category-security","category-system-administration","tag-cbi","tag-hacking","tag-india","tag-norton","tag-pakistan","tag-security","tag-symantec"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p12j6H-6z","_links":{"self":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=407"}],"version-history":[{"count":12,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/407\/revisions"}],"predecessor-version":[{"id":605,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/407\/revisions\/605"}],"wp:attachment":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}