• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Kudos0

Norton's Support Commitment And Our Virus Protection Promise

Norton Security is the leader in digital solutions and we have the best in class digital security solutions available on the market today and it’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise.  Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you support whenever you need it most. We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-up...
Read More
Kudos1

Data Privacy Day 2015

What is Data Privacy Day? Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint. DpD is a series of events online and offline intended to bring awareness of the importance of privacy and how to protect it. Why is Privacy Important? There are many reasons why maintaining your privacy online is important. Protecting your privacy helps impede the theft of financial information and identities. However...
Read More
Kudos1

Adobe Flash Zero-Day Vulnerability Discovered

A new zero-day vulnerability has been discovered in Adobe Flash. Security researcher Kafeine reports that this  vulnerability is currently being exploited in the wild. The term zero-day refers to an unknown vulnerability or an exploit in a software program that the developer of the software is newly aware of, and has not had the time to address and patch. Zero-days are particularly troublesome because they often present an open window during which cybercriminals can operate unchallenged. Because of this, zero-days are prized by cybercriminals who have knowledge of them and are used for a...
Read More
Kudos2

Keep Everyone Protected When Handing Down Mobile Devices This Holiday Season

It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists. And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season. Protect your holiday hand-me-downs To many consumers handing down or selling their device may seem like a harm...
Read More
Kudos1

How To Avoid Scams When Buying Norton Security Software This Holiday Season

If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your devices and your personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software. If your goal is to protect your devices and your identity, you can’t afford to take chances. There are two things you can do to avoid purchasing fraudulent security and antivirus software. First, do your research, educate yourself, and be cautious. Second, pur...
Read More
Kudos1

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts. In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company’...
Read More
Kudos1

Top 10 Small Business Resolutions & Strategies To Achieve Them

With the New Year ahead, and cyber threats continuing to loom over businesses, 2015 will likely bring more sophisticated and complex attacks. Security analysts called 2013 “The Year of The Mega Breach.” According to Symantec’s 2014 Internet Security Threat Report, businesses saw a 91 percent increase in targeted attacks and a 62 percent increase in the number of breaches. Additionally, the recent string of credit card breaches targeting major retailers also provide further reminder that cybercrime remains prevalent and that cyber threats show no sign of slowing down. The exploitable vulne...
Read More
Kudos0

Think Twice Before Forgoing Security on The Connected Devices You Receive—or Gift—This Holiday Season!

With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped your list of things to buy. As you search with excitement to find the device that best fulfills your needs, the thought of installing security software on them might not be at the forefront of your mind. However, considering that an alarming 63 percent of mobile device owners fell victim to cybercrime in 2013, it’s important to take steps to keep the information on your mobile devices secure. Past events continue to substantiate that securing all connected devices is the smartest and easiest w...
Read More
Kudos2

New Years Security Resolutions

While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life. Software Updates- Install Early, Install Often Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out b...
Read More
Kudos1

New Year’s Resolutions – There’s An App For That!

As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful th...
Read More
Kudos0

Get to Know Firewalls 101 - #30SecTech

As the name implies, a firewall is a protective barrier and its job is similar to that of a physical firewall. They stand between your computer and the rest of the digital world to keep you protected from online threats. A firewall is a software program or piece of hardware that secures your computer by limiting who can send you information. All information entering or leaving a network passes through a firewall, which either allows or blocks information based on specified security criteria....
Read More
Kudos1

Holiday Security Tips: an Online Shopping Checklist

We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores. Remember these key tips to shop safely online: Don't click on unsolicited emails or links to "deals" that seem to good to be true. Use the latest, updated version of your internet browser. Check to ensure your purchases and transactions are taking place on a secure site. Read more: The 12 Scams of Holidays Past What is the Safest Way to Pay This Holiday Season?
Read More
Kudos3

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.

Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos0

Secret Life Of Your Mobile Apps Infographic

A Symantec study found that consumers who were most concerned about privacy and security were least likely to be vigilant about what and how information was being used by their free apps.

Read More
Kudos2

Study Finds Mobile Privacy Concerns Often Traded for Free Apps

Newly released Symantec research indicates that most consumers worry about mobile app security and privacy risks. However, most consumers unknowingly – sometimes even willingly – put personal information at risk, compromising their own privacy. In fact, the study found that many of those who worry the most about mobile privacy are the least likely to take precautions to protect themselves—all  in exchange for free app downloads.

Read More
Kudos1

Rethinking Wearable Technology In An Era of Physical-Digital Innovations

Experiencing and using the latest innovations in technology is always exciting—and wearable devices are no exception. Driven by technological advances, social factors, and the Internet of Things, consumers everywhere are enthusiastically embracing wearable technology. As a result, being connected to the Internet is becoming a part of daily life, creating a reality where the physical and digital worlds intersect and overlap at an unprecedented rate, often leaving security behind. Physical-Digital Innovations Allow Us To Experience The World In Unprecedented Ways Connected consumer...
Read More
Kudos1

Pandora #BoldlyGo Concert Series feat Thurston Moore

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans! HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY Date: Thursday December 11th, 2014 Time: Doors at 7:00 pm Location: Marlin Room @ Webster Hall Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at Marlin Room @ Webster Hall 12/11/2014 ...
Read More
Kudos1

How do Hackers Steal Passwords: #30SecTech Video

Passwords are to a hacker like keys to a thief. Although keys and passwords by themselves don’t have much value, the personal information and property that they can expose does. Think of your passwords as your digital keys. They allow access to your personal life, including your networks of friends and colleagues, contacts, photos, videos, emails, and maybe even banking and payment details, among other gems of information....
Read More
Kudos2

How to Counterattack Mobile App Security Risks and Stay Protected

The mobile apps we use can provide other parties access to our information and everything on our devices. Our smart devices are powerful computers, containing valuable information, such as passwords, contacts, phone numbers, photos, videos, and maybe even banking details. Thus, it’s very important to understand the privacy and security implications that come with using any app. Guard your information by exercising caution and by taking three simple steps.

Read More
Kudos3

Point of Sale Malware Attacks Explained - #30SecTech

As consumers around the country get ready for another holiday shopping season, hackers are likely gearing up with Point-of-Sale (POS) malware kits. Over the past year many US retailers—big and small—fell victim to mega-breaches that compromised approximately 100 million payment cards, potentially affecting about one-third of US consumers. Some retailers have taken measures to secure their POS terminals, but until a complete transition to more secure payment technologies is made, many retailers are still vulnerable to POS attacks. Therefore, it is up to consumers to remain vigilant against...
Read More
Kudos0

The 12 Scams of Holidays Past

On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!

Read More
Kudos2

Cyber Espionage Tool Regin Discovered By Symantec

A serious, complex cyber-espionage malware program known as Regin has been discovered by Symantec, the parent company of Norton. 

Read More
Kudos1

Securing the Internet of Things - #30SecTech video

Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT)....
Read More
Kudos1

Happy Thanksgiving!

Read More
Kudos1

How To Stay Safe Online During Black Friday and Cyber Monday Holiday Shopping

The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. Don’t let the numerous deals and distractions cloud your judgment; it’s always important to pay attention to signs that your transactions are secure. You can still shop online and take advantage of Black Friday and Cyber Monday deals with peace of mind. You just have to know what to look for and adhere to simple safety measures.

Read More
Kudos0

What’s the Safest Way To Pay This Holiday Season?

There’s already enough to stress about with the upcoming holiday season- finding the perfect present for everyone on your list, making holiday treats for friends and neighbors, and of course, sending out all of the holiday greeting cards. One less thing that needs to be added to that list is the stress of a credit card data breach. This holiday season, we’re examining all of the ways to pay, on and offline, and the safest way to take care of all of your holiday purchasing needs. Credit Cards and the Recent POS Breaches The topic of data breaches and identity theft has been in the medi...
Read More
Kudos0

Six Key Strategies To Boost E-Commerce Sales This Holiday Season

In the world of e-commerce, cybersecurity, trust and sales are all interrelated, each influencing the other. The more trust indicators you display on your website, the more trust you gain, and the more trust you gain, the more sales you win. Consumers are willing to spend more during the winter holidays than at other times of the year, and online shopping has grown rapidly over the last decade. In fact, a survey conducted by the National Retail Federation revealed that 56% of US consumers expect to do some or all of their holiday shopping online this year, while 44% plan to do all of the...
Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream med...
Read More
Kudos0

WireLurker Malware Affects Apple Devices. Learn More.

Situation overview: Yesterday, security firm Palo Alto Networks, reported on a new family of malware that affects Apple’s OS X and iOS devices called WireLurker.  WireLurker has been used to inject malicious code into Mac applications hosted on a third party Mac app store in China. Once these trojanized apps are downloaded onto a Mac, WireLurker waits for an iOS device to connect via USB and then installs and runs similarly infected iOS apps on the connected iOS device.  In many cases users might not see any difference since the iOS app will operate just like the legitimate version. How...
Read More
Kudos1

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More
Kudos0

Pandora #BoldlyGo Concert Series feat G. Love & Special Sauce

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans! HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA Date: Tuesday, November 11th, 2014 Time: Doors at 7:00 pm Location: 777 Valencia St, San Francisco, CA 94110 Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at The Chapel in San Francisco, CA...
Read More
Kudos2

The Real Cost of Free: #30SecTech Video

With plenty of free security software options out there, it’s easy to wonder why you would want to pay for online protection. But is so-called “free” antivirus really free? Internet connected devices are constantly within reach and as a result more aspects of our lives and information reside within our devices than ever before. Yet many people still see the cyber world and the physical world as separate from each other, not realizing that online information is as valuable to cyber criminals as a wallet is to a mugger. It’s not until a data breach makes headlines that our sense of fear heig...
Read More
Kudos1

Cookies and Your Online Privacy: #30SecTech video

Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out....
Read More
Kudos2

Traveling? Don’t Let Your Mobile Data Stray

Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data. 

Read More
Kudos3

Shellshock, The Latest Mac OSX and Linux Vulnerability—And What It Means For You


Security researchers have discovered a new bug, called, Shellshock, that affects Linux and Unix platforms. If exploited, the bug could impact public facing web servers and Mac OSX users. Our experts let you know what you can do to keep your data safe.

Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos8

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves....
Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos0

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos2

New Windows Zero-day Exploit via Cyberespionage Group Sandworm Discovered

A new vulnerability was discovered in Microsoft Windows Operating Systems, affecting all supported versions of Windows that will deliver malware via PowerPoint documents. Symantec considers this vulnerability critical since it allows attackers remote access to the affected computer.

Read More
Kudos1

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.

Read More
Kudos1

My Account May Have Been Hacked—What To Do Now?

You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox. Regardless of where the leak originated, this is something we see all too often in the tech and business headlines lately. High p...
Read More
Kudos0

Norton business announcement. Norton continues to Go Boldly

Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...

Read More