Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Symantec has admitted that it was breached six years ago, with the source code for its Norton software stolen.
According to Reuters, unknown hackers obtained the source code to Norton Antivirus Corporate Edition, Norton Internet Security, Norton Utilities, Norton GoBack and pcAnywhere.
Symantec previously denied the programs were hacked which said that a document from 28 April 1999 defining the application programming interface for Symantec's virus definition generation service was stolen, and not source code.
Symantec spokesman Cris Paden said at the time: “This document explains how the software is designed to work and contains function names, but there is no actual source code present.”
However, Paden was forced to backtrack on this and admit that it had been breached after an investigation revealed that the company's networks had been compromised.
“We really had to dig way back to find out that this was actually part of a source code theft. We are still investigating exactly how it was stolen,” he said.
“Symantec is currently in the process of reaching out to our pcAnywhere customers to make them aware of the situation and to provide remediation steps to maintain the protection of their devices and information.”
Paden insisted that the 2006 attack presented no threat to customers using the most recent versions of Symantec's software, saying that users are protected against any type of cyber attack that might materialise as a result of this code.
But eEye Digital Security said it detected a worm that was actively exploiting a remote Symantec vulnerability in May 2006, later patched by Symantec on 12th June, 2006.
"...This is the first example of a worm leveraging this vulnerability for self-propagation.”
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.