• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

Scammers Take Advantage Of Ashley Madison Breach

Scammers are taking advantage of the latest big data breach of the online dating site, Ashley Madison. Find out how to stay protected and how Norton has you covered.

Read More
Kudos1 Stats

New Internet Explorer Vulnerability Found - Update Your Version Now

Microsoft has issued a critical security update for their web browser, Internet Explorer. This bug has already been seen in attacks involving the Evangelical Lutheran Church of Hong Kong’s website. 

Read More
Kudos2 Stats

Two New Vulnerabilities Found In Mac OS X

Symantec has confirmed the existence of two new vulnerabilities, which are security holes in software, in Mac OS X operating systems originally discovered by an Italian researcher.

Read More
Kudos3 Stats

Free Movie And Television Scams On Facebook Comments Embedded In Popular Website Articles

Scammers are spreading spyware and malware on embedded Facebook comments that you see at the end of articles on popular sites such as Buzzfeed, ESPN and Huffington Post. They are baiting users with the offering of free first run movies and popular television shows.

Read More
Kudos2 Stats

How To Safely and Securely Use USB Memory Sticks

A malicious USB drive can install malware such as backdoor Trojans, information stealers and much more...

Read More
Kudos1 Stats

Ransomware- When Cybercriminals Hold Your Computer Hostage

[norton-video:youtube:1]Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key. Types of Ransomware Ransomware can present itself in two forms. Locker ransomware will encrypt the whole hard drive of the computer, essentially locking the user out of the entire system. Crypto ransomware will only encrypt specific, seemingly important files on the computer, such as word documents, PDFs and image files. Once the ransomware installs itself, it w...
Read More
Kudos2 Stats

Update Your Version of Firefox Now!

A new bug discovered in the Firefox web browser could allow attackers to gain access to files stored on a computer through malicious code injected into the browser’s built-in PDF viewer. Researchers first discovered attackers exploiting the weak spot in Firefox through a malicious advertisement on a news site in Russia that searched for sensitive user files and uploaded them to a remote server...
Read More
Kudos2 Stats

Critical New Vulnerability Discovered on MacBooks

A critical new vulnerability that can be used to forcibly install software on MacBooks without the users’ consent or administrator password has been discovered on MacBooks running OS X Yosemite, version 10.10. To exploit this bug, attackers create malware that masquerades as adware. When the “adware” is installed, the malware modifies a file in the OS that controls whether you need a password for certain commands, such as installing new software programs. Doing so allows a malicious program to run as though it is the administrator of the computer. How is it spread? Victims are tricked i...
Read More
Kudos2 Stats

Researchers Create Thunderstrike 2- The Firmware Worm That Attacks Macs

Two researchers have designed a worm that can spread itself via the firmware of Apple OS X computers and peripherals, without the aid of connecting to the Internet. Firmware is software that resides on a chip in your device, and provides instructions to the hardware on how to power up properly and then load the operating system....
Read More
Kudos4 Stats

Windows 10 Ransomware Email Scam

Recently, a Windows 10 ransomware scam has been discovered in the form of phishing emails impersonating Microsoft. With new product releases come a slew of scams, vulnerabilities and anything else cybercriminals can use to capitalize on the buzz. Windows 10, the latest version of Microsoft’s operating system, upgrades are slowly rolling out to users in phases, which means some users are looking for ways to skip the virtual line to get their copies sooner rather than later, and scammers have taken notice....
Read More
Kudos1 Stats

Middle School Kit: A Broader World of Cybersecurity Protection

A guide for parents and children. It can be a full-time job for any parent to be constantly aware of everything that their children are doing online. Kids these days may seem pretty sharp with technology and the Internet, however, we forget that they’re still learning (and so are we) and may not always be prepared to spot the risks and pitfalls of being constantly connected. In this two-part article, we’ve put together some tips for you as a parent to ensure that your children are safe on the Internet, and some basic cyber security tips that you can share with your children. The best way ...
Read More
Kudos0

College Kit: How To Keep Devices Secure and Information Safe

College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence. College and technology go hand-in-hand. You use your computer for research and term papers, your phone to keep track of your class schedules, and your tablet to keep up with old and new friends on social media. Technology is a great tool for connecting us all, but that’s the thing- it connects EVERYONE- including cybercriminals.  For ev...
Read More
Kudos0

High School Kit: More Independence Online

You’re learning how to drive, looking into potential colleges, getting your first “real” girlfriend or boyfriend, going to dances, parties, making new friends and having fun!  With all of this newfound independence comes amazing new adventures and experiences in your life. It is easy to get caught up in the excitement, but, along with all of your academic studies and extra curricular activities, an education in cyber security can help keep you safe while you keep exploring.b...
Read More
Kudos0

Grade School Cyber Security Kit: Online Safety 101

The Internet can be a place of endless wonders. It’s where you learn, talk, shop, and play. Still, the Internet is just like anything else in life- there are important rules that everyone should follow in order to make sure they stay safe while online. Follow the Internet rules at school and at home: How much screen time is too much? It’s really easy to get caught up visiting fun websites, and playing awesome games, but there’s also a whole big world to explore, away from the screen! Know when it’s time to put down the mouse and go outside and play. Come to an agreement with your parent...
Read More
Kudos4 Stats

Tips for Migrating to Windows 10

Windows 10 will be available as a free upgrade for Windows 7, 8.1 customers starting July 29th. Following are some tips to help you prepare. 1. Reserve your copy of Windows 10, if you haven’t already. Click the Windows 10 App icon in the system tray of your current device. If you don’t have the Windows 10 App icon, run a Windows update. This should correct the problem on most Windows 7 and 8.1 systems. 2. Check your system compatibility. Windows should notify you of any compatibility problems with your system or software prior to upgrading. However, you can manually check hardware specs...
Read More
Kudos4 Stats

Newly Discovered bug "Stagefright" Can Secretly Sneak Onto Android Phones Via MMS Text Messages

​A new, extremely dangerous flaw dubbed Stagefright, has been discovered within the Multimedia Text Message (MMS) capabilities on Android phones running OS 2.2 and later. This appears to affect about 95 percent of android phones. What Does Stagefright Do? If you have Auto Download capabilities enabled on your text messaging application on your Android phone, an attacker can send an MMS, which can be a photo, video or other piece of media to the device containing malicious code, allowing the exploit to be executed without the users’ knowledge. Stagefright can then bypass the permissions o...
Read More
Kudos2 Stats

Researchers at Norton Discover a Number of “Porn Clicker” Malware Apps on the Google Play Store

The mobile threat landscape is rapidly evolving due to the fact that mobile phones are increasingly becoming an attractive and abundant target to cybercriminals. It seems that there are new threats evolving on a daily basis, and it is vital to be proactive in our defenses against them.

Read More
Kudos1 Stats

UCLA Health Suffers Possible Medical Breach

Healthcare is Big Business for Cyber Criminals The healthcare industry is a prime target for attackers because healthcare data is a treasure trove to cybercriminals. By targeting a hospital’s records rather than just a credit card number or financial data, an attacker can easily gather additional personal information from these sources, especially if their goal is identity theft. As a result, medical records are much more valuable to attackers than single credit card numbers. While a credit card can be canceled or changed, a person’s Social Security number, health history and other things ...
Read More
Kudos2 Stats

Popular Photo Printing Website Suffers Possible Credit Card Data Breach

A popular photo printing website has announced that customer credit card data collected by a third party vendor may have been breached. As a precautionary measure, the company has temporarily disabled their website while the investigation into the breach is still pending. At this point, it is still unknown how many customers were impacted by the breach or what was information was accessed.Data breaches within major companies are becoming all too commonplace these days. Luckily, there are steps you can take to protect your identity if you suspect you have fallen victim to one....
Read More
Kudos4 Stats

Windows 10: New Security Features and the Role of Third Party Security

Just like everyone else, we’re excited about Windows 10 this year. We particularly look forward to new security improvements that Microsoft brings to Windows with each new release. While this may sound like a strange position for a security company to take, the reason why we welcome these improvements is that every security improvement, no matter how big or small, is bad for hackers and criminals and good for consumers.  Like the majority of customers in the market, we’re also customers of Microsoft Windows and we recognize that Microsoft Windows is an attractive target for criminals.

Even with all of the new features, Microsoft Windows’ “attack surface” continues to grow with each new release. Microsoft-developed security improvements and features can play an important role in helping to reduce the attack surface of each new Windows release.

Read More
Kudos5 Stats

Third Adobe Flash Exploit Found in Hacking Team Data Dump

Last week, the cyber attack against the hackers-for-hire firm Hacking Team, led to a theft of 400gb of data that exposed two Adobe Flash Player vulnerabilities.  In addition to those two vulnerabilities, another bug was exposed, making this the third Adobe Flash  exploit to come from the stolen data. This vulnerability (CVE-2015-5123) emerged late last week and Adobe quickly released a security bulletin over the weekend, that stated a patch will follow this week.  It is always best to update any software that has updates available as soon as possible, as software patches address these typ...
Read More
Kudos2 Stats

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where attackers eavesdrop on connections with secure websites such as online banking, ecommerce or email. This means that any data that a user sends to a website can be intercepted by the eavesdropping attacker- including user login credentials....
Read More
Kudos2 Stats

Cyber Espionage Group Butterfly Targeting Major Corporations

Corporate espionage group Butterfly has compromised a series of major corporations over the past three years, targeting confidential information and intellectual property. Symantec has been monitoring this group and working with its victims to track the attackers over the past two years. While tracking the group, Symantec found that Butterfly compromised high-profile companies operating in the Internet, IT software, pharmaceutical and commodities sectors. Twitter, Facebook, Apple, and Microsoft are among the companies who have publicly acknowledged the attacks. Stolen Information This g...
Read More
Kudos6 Stats

HackingTeam Data Dump Leads to Adobe Zero Day Discovery

A new zero-day vulnerability in Adobe Flash Player was discovered via a cyberattack against the hackers-for-hire firm Hacking Team. A large amount of internal information leaked by the attackers contained data on the exploit, which could crash a computer and allow a remote attacker to then take control of the machine. Now that the details of the vulnerability are publicly available, there is a good chance attackers will jump on this bug quickly to exploit it before a patch is issued....
Read More
Kudos4 Stats

Get Ready For Some Big Updates!

Beginning this month, we will begin automatically updating customers with a new PC client that provides the best usability, performance and protection that we offer to-date. We’re rolling these updates out to users over the next several months, however, you have an opportunity to get these features now.

Read More
Kudos2 Stats

Cybercrime Survival Toolkit- Surviving The Most Dangerous Town On The Internet

[norton-video:youtube:1]As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more....
Read More
Kudos0

How Do Cybercriminals Make Money?

Since most of what we do is now online, from shopping for food to paying bills, the global economy is taking a digital shift. It’s only natural for criminals to follow suit. As criminals consider the economics of what they do, they recognize cybercrime as one of the quickest ways for them to make money. For a hacker, extortion is an easy way to monetize stolen information and provides the shortest path from cybercrime to cash. In addition to extortion, criminals can make money off of fake auctions, stealing someone’s identity, and by selling stolen information such as credit card numbers,...
Read More
Kudos1 Stats

Team GhostShell Hacking Group is Back

A group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities. Using a Twitter account, these cybercriminals are dumping the data that was allegedly gathered from the data breaches, and posting links to the data dumps on Twitter. These data dumps include emails, user names, addresses, telephone numbers, Skype names, dates of birth, and other personally identifiable information. This is not the first time we have seen activity from this group,...
Read More
Kudos2 Stats

Dyre Straits? Dangerous Financial Trojan That Steals Banking Credentials Gains Ground

Customers of over 1,000 banks and other financial institutions around the world have recently fallen victim to a malicious piece of software, called the Dyre financial Trojan. Over the past year, Dyre has become a powerful tool for cybercriminals, enabling them to commit financial fraud, particularly in the US and UK, where the largest numbers of targeted banks are located.

Read More
Kudos1 Stats

New Bugs Found In Apple’s iOS and Mac Operating Systems Could Result In Stolen Passwords

Researchers from the University of Indiana discovered a bug in Apple’s operating system that could allow cybercriminals new ways to use apps to hijack passwords. 

For now, nobody has seen these flaws exploited in this way, but researchers at Symantec believe that, now that this bug has been exposed, it’s only a matter of time before cybercriminals start using it...

Read More
Kudos2 Stats

Password Managers Are The Key To Secure Passwords

According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts....
Read More
Kudos0

A New Vulnerability in Apple's iOS Could Help Scammers Capture iCloud Passwords

Researchers discovered a new vulnerability in Apple’s mobile iOS platform that has the potential to trick users into divulging their passwords to scammers. A bug lurking in Apple’s iOS mail app on both iPhone and iPad, involved in handling HTML code will allow scammers to send a phishing email that will prompt a popup dialogue box asking for the user’s iCloud password. This popup mimics the iCloud login window, prompting users to re-enter their password. An easy way to spot the fake is that the login window can be cleared by pressing the home button, whereas the legitimate iOS popups won’...
Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies....
Read More
Kudos1 Stats

Data Breaches Aren't Going Away- What You Need To Know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks are becoming the new wave of crime. Corporations and even small businesses are extremely attractive targets to cybercriminals, simply due to the large payday of data that can be nabbed in one fell swoop....
Read More
Kudos1 Stats

New Mac Flaw Can Allow Attackers Access Once It Goes Into Sleep Mode

An independent security researcher recently discovered that some Apple Macs older than a year are susceptible to a nasty bug that would allow attackers to gain access to a computer once it wakes from “Sleep mode”. The bug affects Mac's sleep-mode energy conservation application, which can leave the computer vulnerable after it wakes up from being put into sleep mode. While this attack is very hard to execute and there are no reports of this bug being used by attackers in the wild, it is still important to be aware of this vulnerability and know how to stay safe. Is My Computer Vulnerabl...
Read More
Kudos1 Stats

A New Look into Cybercrime- “In Search Of The Most Dangerous Town On The Internet”

[norton-video:youtube:1]Cybercrime is on the rise, and although it may seem like it is faceless crime, it is not. “In Search Of The Most Dangerous Town On The Internet” takes a deep, personal look into the real world of cybercrime. The Romanian town Râmnicu Vâlcea, also known as, "Hackerville", is home to many notorious scammers and convicted blackhat hackers, such as Guccifer, who was responsible for the Hillary Clinton email hack. Through their own words, they discuss their methods for deploying malicious worms, viruses, social engineering scams, stealing identities, and the surprising r...
Read More
Kudos13 Stats

Windows 10 Compatibility With Norton Products

As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are also entitled to receive free support at http://support.norton.com. If you’re using Windows 7 or 8, you may have already reserved an upgrade to Windows 10 before its July 29th release. After doing so, Microsoft’s app compatibility checker may show that your Norton product is incompatible with Windows 10. Not to worry- you’re still protected with the best in-class security for your PC. There will be an update available for a Windows ...
Read More
Kudos1 Stats

What Happens When Your Identity Is Stolen?

The IRS has announced that it will be notifying taxpayers after third parties gained unauthorized access to information on about 100,000 accounts through the “Get Transcript” online application. You can view more about the breach via a statement on the IRS’s website. More About Identity Theft: According to the Federal Trade Commission’s 2014 Consumer Sentinel Network Data Book, identity theft once again tops consumer complaint categories in 2014. Identity theft can be committed in many ways: from non-technical methods such as stealing purses or “dumpster diving” for documents that have b...
Read More
Kudos2 Stats

Stolen Funds From Starbucks Customers Another Reminder to Use Unique Passwords

It’s all over the news: headlines claiming that Starbucks was hacked or that hackers broke into the Starbucks mobile app. What is true is that cybercriminals are targeting Starbucks accounts, but not because of a breach. We suspect that these accounts are being targeted because of weak customer passwords or user credentials obtained from other data breaches....
Read More
Kudos4 Stats

What is the Difference Between Black, White and Grey Hat Hackers?

[norton-video:youtube:1]Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission.  Many companies and government agencies actually employ hackers to help them secure their systems....
Read More
Kudos4 Stats

SSL Certificates: What Consumers Need to Know

Guest post by Jeff Barto, Trust Strategist, Evangelist & Website Security Advocate for Symantec In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates- otherwis...
Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos1 Stats

Take The World Backup Day Pledge!

[norton-video:youtube:1]Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.....
Read More
Kudos6 Stats

What Is a Virus #30SecTech

[norton-video:youtube:1]A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document....
Read More
Kudos2 Stats

Spring Cleaning to Secure Your Digital Life

Tidy Up Your Digital Life It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started: Cleanup your PC workspace: Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized.   Get organized: Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folders t...
Read More
Kudos2 Stats

Be Still My Bleeding Heart: The Latest OpenSSL Vulnerability Is Nothing To Worry About

On March 19th, 2015, website developers who use OpenSSL learned of several bugs, including a severe bug that could allow hackers to render a webserver or website unavailable to users. What is OpenSSL? The “Open” in OpenSSL means that any developers can work on the code in the project. The SSL refers to secure sockets layer, which is a form of security built into a web browser that is used to encrypt and decrypt data being sent across the web. How does this affect me? Luckily, this exploit has not been seen in the wild, however, if the vulnerability is exploited, it can take down bo...
Read More
Kudos3 Stats

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information. Exploit Kit Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through that...
Read More
Kudos4 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not mal...
Read More
Kudos3 Stats

What is Social Engineering?

[norton-video:youtube:1]We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack....
Read More
Kudos1 Stats

Spring Break and Mobile Device Safety

Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; t...
Read More