• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Kudos0

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.

Read More
Kudos0

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1

The New Norton

Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.

Read More
Kudos3

Shellshock, The Latest Mac OSX and Linux Vulnerability—And What It Means For You


Security researchers have discovered a new bug, called, Shellshock, that affects Linux and Unix platforms. If exploited, the bug could impact public facing web servers and Mac OSX users. Our experts let you know what you can do to keep your data safe.

Read More
Kudos0

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos0

The Worm in the Apple, Part 3 - How to Secure Your iPhone and iCloud in Light of Recent Photo Leaks

We're sure you've heard about the multitude of celebrity photos that were leaked from iCloud accounts. Read on to find out how it was done, and how you can secure your own iCloud account to make sure something like that doesn't happen to you.

Read More
Kudos1

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More
Kudos0

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus. There are the obvious precautions to take in protecting your devices, such as never leaving ...
Read More
Kudos0

Android AOSP Browser Bug Could Affect 75 Percent Of Users

A new Android vulnerability, which could allow attackers to view open Web pages on the victim’s Android Web browser or hijack their online accounts, has recently been uncovered, and may impact an estimated 75 percent of android users.   Uncovered in early September, by security researcher, Ray Baloch, the Google Android Browser Same Origin Policy Security Bypass Vulnerability (CVE-2014-6041) reportedly affects any Android version below 4.4. The bug, found in the Android Open Source Project browser (or AOSP browser—a browser that Google no longer supports), could be exploited by an attacker...
Read More
Kudos1

Data Breach - The Best Defense is Vigilance

There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is understanding what the thieves are after, so you can make it harder for them to win. Egan answers some commonly asked questions about shopping and credit card safety: So what is being stolen and how is it being used? In point of sale (POS) breaches, thieves are stealing your 16-digit credit card numbers. Those numbers are most useful to thieves (and m...
Read More
Kudos0

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 websites through botnets (computers that have been infected with and controlled by a computer virus). The sites ranged from small sites to larger household names. Many of the targeted sites are still vulnerable....
Read More
Kudos1

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves....
Read More
Kudos1

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this “news” may not be what it seems....
Read More
Kudos0

Back Up Your Finals and Midterms to the Cloud

In today’s fast-paced world, you can be sure that most universities have gone digital. As a result, more students are saving their important papers on their computers and external hard drives. However, from what I’ve seen, that’s about as far as most students go to safeguard their work. With so many hours (and lost sleep) going into these papers, it is essential to make sure you have it backed up in the cloud, because there would be nothing worse than losing all of your hard work due to a computer crash or hard drive failure. If you only save your work on a hard drive, once your computer ...
Read More
Kudos0

Mobile Security Advice For The New Term

Technology and education now go together more closely than ever, with laptops and tablets now regular sights in classrooms. The range of educational apps in both the iOS App Store and the Google Play Store is huge and growing all the time, and the cloud has made it possible to learn across multiple devices with ease....
Read More
Kudos0

How to Spot a Fake Android App

Malware on mobile devices is rampant. CNN reports that 55% of Internet traffic in January was on mobile devices, so it seems natural that cybercriminals target mobile, often devising scams using the apps that are most familiar to users.  Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games. Recently, Symantec discovered cyber scammers attempted to impersonate Norton products, and, while imitation is the sincerest form of flattery, we...
Read More
Kudos0

Stop Stressing: 10 Internet Safety Rules To Help Keep Your Family Safe Online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the Internet also has the potential to harm us, and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real....
Read More
Kudos0

BYOD in K-12 Schools: 5 Tips to Help Parents Keep Their Kids Safe

   Despite controversial beginnings, many school districts across the United States are embracing BYOD—bring your own device—in the classroom by expanding curriculum to include student owned devices. With this trend gaining momentum, some districts are starting to run pilot programs to explore the benefits of bringing mobility to classrooms through BYOD. Rather than fighting against change, forward thinking school districts are moving into 21st century learning environments because they recognize the advantages of incorporating tehcnology and learning applications into the classroom to bett...
Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot se...
Read More
Kudos0

'Backoff' Malware Steals Customer Credit Cards From 600 Stores

Last week, the Department of Homeland Security reported that around 600 businesses fell prey to a Point of Sale malware, called “Backoff”, that steals customer payment details through remote access applications. Most of the businesses affected were small, independent brick-and-mortar retailers, but some larger chains were impacted as well. The scope of the attacks could widen as more affected businesses are discovered....
Read More
Kudos0

Mobile Fitness Trackers May Be One Step Away From Hacks

Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.    It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of our...
Read More
Kudos0

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device....
Read More
Kudos0

System Admin Day 2014! Reasons to Thank Your System Administrator Today (and Everyday).

Today marks the 15th annual System Administrator Appreciation Day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day here are a few of the top reasons to say thanks. Thank your SysAdmin on System Adminstrator Appreciation Day! When your server goes down at midnight on a Saturday, a sysadmin IT pro has everything up and running by 9a.m. on Monday. That lovely interwebz connection you are accessing to view this very blog from your office network – all thanks to a sysadmin’s handiwork. “I...
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click....
Read More
Kudos0

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. [7/21: The #BoldlyGoContest has officially closed. Thank you for all who shared a wish and contest entry for going boldly, not blindly. Congratulations to all the winners.] Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @NortonOnline an...
Read More
Kudos0

Security Experts 'Pin' So-Called Miracle Diets As Social Scams

Obesity is a known topic of conversation in the United States, with one in three U.S. adults being categorized as overweight. Most of us have come across posts claiming to promote a new weight loss "miracle" in our online experiences. Healthcare experts are constantly reporting that there is "no such thing" as a miracle diet, but, much like a fabled lake monster, or a giant hairy beast in the woods, legends die hard.  Scammers are always trying to find new ways to lure in vulnerable dieters who still want to believe that an easy solution exists. They use social media as a vehicle to peddle...
Read More
Kudos0

Prevent Scammers From Taking Over Your Company's Social Presence

Social media is a hugely important tool for growing your business’s brand, and the last thing you want to do is expose your customers to spam. Yet we’ve all seen it: the tweet promising thousands of new followers or the Facebook post teasing a way to lose weight or earn easy money – of course only if you’ll click on a link. It’s an issue that’s not going away any time soon, and it must be handled in the right way....
Read More
Kudos0

Symantec Security Detects Dragonfly's Energy Sector-Targeting Cyber Schemes

New research from Symantec uncovering a cyber-espionage campaign that has affected 1,018 unique organizations across 84 different countries has demonstrated the impact of sophisticated phishing attacks and watering hole techniques. The attacker group, dubbed “Dragonfly” by Symantec security experts (other vendors have called them, "Energetic Bear"), launched a campaign against a range of targets, predominantly in the European and American energy sector, over a number of months. Dragonfly used multiple attack methods to install malware onto systems, extracting passwords and documents among ...
Read More
Kudos0

How Can Small Businesses Develop Trust with Customers?

In a small business, your top priority when dealing with customers is trust. Recent high-profile security breaches have eroded consumer confidence, and it’s more important than ever to reassure your customers that they’re safe shopping with you. According to Symantec’s Sr. Director of Product Management, Robert Hoblit, the vast majority of visitors to any shopping site will arrive through web search or advertising, and first impressions are vital. “Around 80% of the customers that land on your website are actually first-time buyers,” he says. “They’ve never seen you before, they’ve never e...
Read More
Kudos0

Will Amazon’s Fire Phone "Burn" Users?

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone. For the original article, and to catch the latest security intelligence information, check out Symantec's Security Response blog: http://www.symantec.com/connect/blogs/will-amazon-s-fire-phone-burn-users...
Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.  ...
Read More
Kudos0

BYOD vs. CYOD: What's The Best Fit For Your Business?

The last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature....
Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats.You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs was...
Read More
Kudos0

Quick Tip Guide to Kids' Social and Mobile Privacy

You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps....
Read More
Kudos0

Securing Your Small Business Social Media Plan

Today's social media is a crucial tool for business,  Companies that use Twitter, Facebook and other tools in an organised and efficient manner can achieve incredible engagement for relatively little cost, and (with a healthy dose of good fortune) a strong social media campaign can take off around the world and do more for brand recognition than traditional advertising. The key is finding the right balance between informal spontaneity and well-planned company output, and it’s a balance a huge number of businesses are finding hard to get right....
Read More
Kudos0

3 Hot Mobile Security Tips For Summer Travel

Summer’s finally here, so whether you intend to take a picnic to the park, play with the children in the garden or jet off to somewhere even sunnier, some simple precautions will keep you and your devices safe this summer. Watch your devices First up, physical security. With more outdoor activity it’s natural that it won’t only be your smartphone that travels with you. Parks these days are full of tablets and even lightweight laptops, to go with the many Kindles and Bluetooth speakers, so it pays to be aware of just how valuable your possessions are. Don’t leave them lying in plain sight ...
Read More
Kudos0

In Defense of Devices: Cyber Security Concerns Spread Beyond Your Phone

We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly....
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud?...
Read More
Kudos0

Smart Tips For Smart TV Watching With Dad

It’s Father’s Day once more on June 15th, but this isn’t any old Father’s Day – this one might as well have every dad’s birthday and Christmas Day rolled in as well. Yes, Father’s Day in 2014 falls right at the start of the World Cup in Brazil and on the final day of the US Open golf championship, which makes it all the more likely that dad will be settling down in his armchair to enjoy that new Smart TV he’s had his eye on....
Read More
Kudos0

Top 10 "Riskiest" Websites

We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day....
Read More
Kudos0

Keeping Your Business Safe From Attack

According to the 2014 Symantec Internet Security Threat Report, which examines the data from more than 41.5 million attack sensors and records thousands of events per second, spear phishing is not dead – it’s merely evolving. The technique uses fake emails to target a specific organisation in order to gain access to internal data, and although attackers used fewer emails on fewer targets last year, the total number of spear-fishing campaigns was up a startling 91%....
Read More
Kudos0

What's The REAL Cost of 'Free'?

Consumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected....
Read More
Kudos0

How Norton Keeps You "Shaded" From 'Silent, But Deadly' Threats

On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware. Blackshades is a “silent, but deadly” threat, which unfortunately means, if you are infected, you likely won’t know it until it’s too late. Norton products have long been able to detect and block Blackshades from attacking your computer. Read on to learn more about this threat and how to protect yourself and your computers....
Read More
Kudos0

World Backup Day and Digital Spring Cleaning

March 31 marks World Backup Day! What is backup? It's a second copy of all your most important files like financial documents, family photos, videos and more. While it's best to backup your files regularly now is as good a time as ever.  Here are a few more tips for digital spring cleaning! Read on. ...
Read More
Kudos0

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to be...
Read More
Kudos0

Got an Idea? Tell us!

Got an Idea? Tell us! Have you ever used a product and thought “if only it had this feature…” or “if I could just do that easier” wishing you could spend a few minutes with the developers to hear you out?  Well, today we’re excited to introduce a new section of the Norton Community called Norton Ideas which will allow you to do just that.  Norton Ideas is a site that will allow you to submit your product feature suggestions directly to the Norton product development team.  The Norton product team is here to listen to your suggestions, discuss them amongst the community and put the best ide...
Read More
Kudos0

How Safe Is That App? Mobile Security Expert Tips To Help Protect Your Mobile Device.

Mobile apps have transformed the way we interact with our smartphones and tablets. If you’re looking for a quick way to access your bank accounts, a tool to make you more productive while on the move, or a game to help pass the time while you’re waiting for a bus, there’s an app for that. In fact, with over 1 million apps on Google Play, for instance, there are often thousands of options to choose from in each app category. The fact that many can be downloaded in a matter of seconds means that you’re only ever moments away from installing a tool that could bring innovative new functionalit...
Read More
Kudos0

Time-Saving Software To Simplify Your Life

There’s no doubt that technology has made many areas of our lives simpler. We can now access files from any device, anywhere, and we can take full advantage of fast internet speeds to do things that weren’t possible just a few years ago. But as we use more technology, that simplicity can be eroded as our devices demand monthly, weekly, even daily updates. Our software applications add new features we didn’t ask for but have to learn and our documents move from one hard disk to multiple locations around the cloud, each with their own logins and capacity limits....
Read More
Kudos0

Antivirus-Only Is Dead. Long Live Security!

Are you doing enough to keep your information safe? With today’s sophisticated cyber threats you need more than just traditional antivirus (AV) software to stay protected. AV software can prevent, detect and remove malicious computer programs, and while more traditional viruses and email spam still exist, people now have more complex threats to worry about – and more important information to protect. ...
Read More