The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.
With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals and the attacks they launch become more sophisticated, we’re strengthening our advanced threat protection technologies and improving performance across your Android, Windows, Mac and iOS devices.
First, we’re streamlining our Norton product portfolio from nine products to one flagship solution: Norton Security. Norton Security will be available with and without cloud backup and combines the functionality of our existing products, eliminating the need for you to choose among nine different flavors. Norton Security is currently in public beta and slated for general availability this fall. As part of this change, we’ll be retiring some of our stand-alone legacy products, such as Norton Internet Security, Norton AntiVirus and Norton360.
We are also making the product itself simpler to use with dramatic improvements to the user interface. With its improved look and feel as well as cloud-based management, Norton Security will feel much more like a service and less like the software you used to “set and forget.” And because Norton Security is cloud-based, it will be simple to add and manage new devices through your personal Norton account – just like you do on Netflix and iTunes. As an added benefit of this service, we’ll keep you armed with real-time updates on threats and tips to help ensure you stay confident and protected wherever you go.
To complement Norton Security’s advanced security technologies, we will continue to offer an optional cloud backup feature to keep your data secure and always available. Norton Security is backed by the largest threat intelligence network in the world, and a team of passionate security experts working around the clock to monitor threats, develop and update our products. We will continue to provide the 24/7 customer support you’ve come to expect.
We are so confident in the protection and support provided as part of the Norton Security service, we are offering a 100% virus-free money-back guarantee.
One Service. Total Protection. Guaranteed.
Norton has the people, products and threat intelligence to protect you and the connections you make throughout your day.
It's back to school time again, and it won't be long before the homework assignments start rolling in. Accessing the Internet offers children a limitless amount of information and learning opportunities, but how do you make sure that you keep your family--and all of your private information--safe, while taking advantage of modern technology?
Mobile apps are getting more useful in a learning environment, but, with greater vulnerabilites and explots being discovered on mobile devices, it's equally important to learn how to protect your information on your tablet and mobile phone.
As students prepare for back-to-school this year, mobile devices are on many parents shopping lists. Schools across the US are adopting BYOD—bring your own device—by integrating student owned devices into classroom curriculum. Consider these cyber safety tips for a positive BYOD experience.
byNadia_Kovacs08-11-201411:13 AM - edited 08-11-201411:13 AM
Going back to college can be a hectic time of the year for many students. With so many things to keep track of — class schedules, dorm assignments, textbooks — it is easy to lose sight of other important issues that may not occur to you, such as keeping your identity secure while on campus.
The New York Times has reported the biggest known data breach by a Russian crime ring, responsible for 1.2 billion stolen logins for around 420,000 websites. Here's how to protect your most important data right now.
Viruses have evolved and changed drastically over time. What once started out as helpful utilities to programmers, has now progressed into the malware that we deal with today. Read on to learn more about the history and evolution of viruses.
A new version of POS malware that steals credit card data through remote access applications was discovered by the Department of Homeland Security to have affected around 600 stores. Find out how to keep your funds from falling into the wrong hands.
bySolange_Desc07-30-201410:00 AM - edited 07-29-201407:25 PM
Could your mobile fitness tracking device or apps be sharing your private health data? Symantec researchers found surprising vulnerabilities in both device technology and the apps they use to track your information. Check out our expert tips on how to keep your identity safe while keeping your health on track.
A widespread vulnerability in Android's operating system that could expose personal user information to hackers has been detected. Google has issued a patch to its partners, but, in the meantime, Norton provides tips on how to safeguard your mobile data.
Today marks the 15th annual System Administrator Appreciation day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day, read on for a few of the top reasons to say thanks.
Scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts spreading spam, offensive content, and malvertisments for profit. Read on for details on what to look out for and tips to protect yourself from social media scams.
Is there such a thing as a miracle diet pill? Symantec's Satnam Narang points out the latest online diet scams that are infiltrating sites like Pinterest, and gives you key tips on how to protect your social media accounts.
Spammers like to take advantage of a business's social media following by posting or tweeting ad spam. How to deal with it? We offer some security-savvy tips to help keep these pesky scams from taking over your business's social walls and feeds.
Symantec security experts have uncovered a cyber-espionage campaign targeting Western energy companies. The group, which Symantec calls "Dragonfly", targeted 1,018 unique organizations over 84 countries using spear phishing and watering hole tactics to install malware onto victoms' computer systems.
As a small business, promoting trust among customers online is vital in today's economy, but how can you do that? Norton offers some important tips and a couple of unique offerings to help bolster your site's security and online reputation.
While the World Cup Security Center's Wi-Fi password was revealed on Twitter, the incident serves as a reminder that proactive security habits are key to protecting your information from hacking or data theft. Read on for tips to better Wi-Fi security that you can follow now.
You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. Learn more about securing your small business.
You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Check out these quick steps you can take to make social networking and mobile habits safer for children.
We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. See how the #BoldlyGoContest works.
Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up.
We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly.
Gooooaaaaaaaaalll! Bonding with Dad over the World Cup on a new Smart TV can be a great way to celebrate this Father's Day, but, with every Internet-connected device comes new vulnerabilities that can put your privacy and personal data at risk. Find out how to have a safer viewing experience so that you (and Dad) can keep your eyes on the ball.
We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Norton experts have identified the top ten of website categories that are most vulnerable.