Norton Protection Blog
Norton Protection Blog

How to Spot a Fake Android App

by on ‎08-18-2014 04:41 PM


malware_android_fake_app copy.jpgFake Android apps are everywhere these days. Luckily, it's not difficult to protect yourself with these helpful tips to help you determine which one is the fake and which is the real deal.

Read more...

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

 

With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals and the attacks they launch become more sophisticated, we’re strengthening our advanced threat protection technologies and improving performance across your Android, Windows, Mac and iOS devices.

 

First, we’re streamlining our Norton product portfolio from nine products to one flagship solution:  Norton Security. Norton Security will be available with and without cloud backup and combines the functionality of our existing products, eliminating the need for you to choose among nine different flavors. Norton Security is currently in public beta and slated for general availability this fall.  As part of this change, we’ll be retiring some of our stand-alone legacy products, such as Norton Internet Security, Norton AntiVirus and Norton360.

 

We are also making the product itself simpler to use with dramatic improvements to the user interface.  With its improved look and feel as well as cloud-based management, Norton Security will feel much more like a service and less like the software you used to “set and forget.” And because Norton Security is cloud-based, it will be simple to add and manage new devices through your personal Norton account – just like you do on Netflix and iTunes. As an added benefit of this service, we’ll keep you armed with real-time updates on threats and tips to help ensure you stay confident and protected wherever you go.

 

To complement Norton Security’s advanced security technologies, we will continue to offer an optional cloud backup feature to keep your data secure and always available. Norton Security is backed by the largest threat intelligence network in the world, and a team of passionate security experts working around the clock to monitor threats, develop and update our products. We will continue to provide the 24/7 customer support you’ve come to expect.

 

We are so confident in the protection and support provided as part of the Norton Security service, we are offering a 100% virus-free money-back guarantee.

 

One Service. Total Protection. Guaranteed.

 

Norton has the people, products and threat intelligence to protect you and the connections you make throughout your day.

Kidsusingtablet.jpgIt's back to school time again, and it won't be long before the homework assignments start rolling in. Accessing the Internet offers children a limitless amount of information and learning opportunities, but how do you make sure that you keep your family--and all of your private information--safe, while taking advantage of modern technology?

Read more...

Mobile Security Advice For The New Term

by ‎08-13-2014 01:28 PM - edited ‎08-19-2014 12:50 PM

Student mobile security.jpgMobile apps are getting more useful in a learning environment, but, with greater vulnerabilites and explots being discovered on mobile devices, it's equally important to learn how to protect your information on your tablet and mobile phone.

Read more...

BYOD in K-12 Schools: 5 Tips to Help Parents Keep Their Kids Safe

by ‎08-12-2014 10:00 AM - edited ‎08-12-2014 09:28 AM

As students prepare for back-to-school this year, mobile devices are on many parents shopping lists. Schools across the US are adopting BYOD—bring your own device—by integrating student owned devices into classroom curriculum. Consider these cyber safety tips for a positive BYOD experience.

Studentsonmobile.jpeg

Read more...

Top 5 Tips to Protect Your Identity on Campus

by ‎08-11-2014 11:13 AM - edited ‎08-11-2014 11:13 AM

back_to_sch00l_wifi-protection_vpn_https_secure-passwords_social-media_spam_email-securitysmall.jpgGoing back to college can be a hectic time of the year for many students. With so many things to keep track of — class schedules, dorm assignments, textbooks — it is easy to lose sight of other important issues that may not occur to you, such as keeping your identity secure while on campus.

Read more...

PasswordMegaBreach.jpgThe New York Times has reported the biggest known data breach by a Russian crime ring, responsible for 1.2 billion stolen logins for around 420,000 websites. Here's how to protect your most important data right now. 

Read more...

ransomware_malware.pngViruses have evolved and changed drastically over time. What once started out as helpful utilities to programmers, has now progressed into the malware that we deal with today. Read on to learn more about the history and evolution of viruses.

Read more...

creditcardstolen.jpgA new version of POS malware that steals credit card data through remote access applications was discovered by the Department of Homeland Security to have affected around 600 stores. Find out how to keep your funds from falling into the wrong hands.

Read more...

Mobile Fitness Trackers May Be One Step Away From Hacks

by ‎07-30-2014 10:00 AM - edited ‎07-29-2014 07:25 PM

Anatomyoftrackingdevice.pngCould your mobile fitness tracking device or apps be sharing your private health data? Symantec researchers found surprising vulnerabilities in both device technology and the apps they use to track your information. Check out our expert tips on how to keep your identity safe while keeping your health on track.

Read more...

Androidfaker.jpgA widespread vulnerability in Android's operating system that could expose personal user information to hackers has been detected. Google has issued a patch to its partners, but, in the meantime, Norton provides tips on how to safeguard your mobile data.

Read more...

System-Administrator-Day-2014-SysAdmin.jpgToday marks the 15th annual System Administrator Appreciation day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day, read on for a few of the top reasons to say thanks.

Read more...

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

by ‎07-23-2014 10:05 AM - edited ‎07-23-2014 11:07 AM

protect-yourself-from-malaysia-air-scams.jpgScammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts spreading spam, offensive content, and malvertisments for profit. Read on for details on what to look out for and tips to protect yourself from social media scams.

Read more...

dietscams.pngIs there such a thing as a miracle diet pill? Symantec's Satnam Narang points out the latest online diet scams that are infiltrating sites like Pinterest, and gives you key tips on how to protect your social media accounts.

Read more...

Social spam.jpgSpammers like to take advantage of a business's social media following by posting or tweeting ad spam. How to deal with it? We offer some security-savvy tips to help keep these pesky scams from taking over your business's social walls and feeds. 

Read more...

Dragonfly 1.jpgSymantec security experts have uncovered a cyber-espionage campaign targeting Western energy companies. The group, which Symantec calls "Dragonfly", targeted 1,018 unique organizations over 84 countries using spear phishing and watering hole tactics to install malware onto victoms' computer systems. 

Read more...

NSec_SYM_MKTG_RGB.pngAs a small business, promoting trust among customers online is vital in today's economy, but how can you do that? Norton offers some important tips and a couple of unique offerings to help bolster your site's security and online reputation.

Read more...

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone.

Read more...

Lessons Learned from World Cup Wi-Fi Security Gaffe

by ‎06-24-2014 02:11 PM - edited ‎06-25-2014 08:43 AM

While the World Cup Security Center's Wi-Fi password was revealed on Twitter, the incident serves as a reminder that proactive security habits are key to protecting your information from hacking or data theft. Read on for tips to better Wi-Fi security that you can follow now.

Read more...

BYOD vs. CYOD: What's The Best Fit For Your Business?

by ‎06-23-2014 05:09 PM - edited ‎06-23-2014 05:23 PM

BYOD vs CYOD.jpegSymantec mobile expert, Justin Martin, shares helpful tips on determining the right fit for your mobile workforce.

Read more...

smallbiz-blog.JPGYou’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. Learn more about securing your small business.

Read more...

Social-Media-Privacy-FamFirstBlog.jpgYou can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Check out these quick steps you can take to make social networking and mobile habits safer for children.

Read more...

Social Media Security.jpgToday's social media is a crucial tool for business, Here are some tips from the Director of Social Marketing at Symantec, Charlie Treadwell, to help you run an effective and secure social plan.

Read more...

Holiday security.jpgHeading out of town this summer? Travel can be great, but it can also put your personal information at risk. Follow these tips to hit the road securely.

Read more...

Introducing Boldly Go Wishes

by ‎06-16-2014 05:30 AM - edited ‎07-21-2014 09:16 PM

norton_social_TWITTERcontest_launch_645blog.jpgWe want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. See how the #BoldlyGoContest works.

Read more...

cloudimage.pngClaire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. 

Read more...

Mobile security.jpegWe’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly.

Read more...

Smart TV.jpgGooooaaaaaaaaalll! Bonding with Dad over the World Cup on a new Smart TV can be a great way to celebrate this Father's Day, but, with every Internet-connected device comes new vulnerabilities that can put your privacy and personal data at risk. Find out how to have a safer viewing experience so that you (and Dad) can keep your eyes on the ball. 

Read more...

Top 10 "Riskiest" Websites

by ‎06-11-2014 02:49 PM - edited ‎06-11-2014 02:50 PM

Website security.jpegWe all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Norton experts have identified the top ten of website categories that are most vulnerable.

Read more...

What's The REAL Cost of 'Free'?

by ‎06-03-2014 02:45 PM - edited ‎06-03-2014 05:24 PM

Free software.jpegConsumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected

Read more...

Join the Conversation
For the latest news, tips and product info to keep you safe online, "Like" Norton on Facebook and follow @NortonOnline on Twitter.

About the Author
Labels