• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

Norton Utilities Premier – New!

Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data.  Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk.  What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.  I’m excited to announce the newest Norton weapon in the fight against PC slugg...
Read More
Kudos0

Microsoft Security Essentials: “Reruns” Aren’t Just for TV Anymore

If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.” Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Read More
Kudos2 Stats

Norton SafeWeb - increasing online comfort and confidence

(view in My Videos)Sometimes you need a bodyguard, sometimes you need an advisor  Most often, users are concerned about dangerous, active threats against their computer. If malware is detected on the PC, users generally prefer that it is simply and quietly blocked. Similarly, when users are online, they expect to be protected from pages that contain malicious content or that are part of phishing scams. Phishing sites are an obvious, immediate and direct threat on a user’s most valuable information. This is a simple security decision. A webpage is either the correct webpage or it’s an imp...
Read More
Kudos1 Stats

Norton Safe Search – New and Improved

We’re excited to tell you about the new and improved version of Norton Safe Search, now available as part of the Norton Internet Security 2010 public beta.  Norton Safe Search takes the site ratings provided by Norton Safe Web a step further by delivering a fully customized search results page with built-in security features such as filtering out unsafe sites, an interstitial warning page, Privacy Safeguard, and other options such as allowing users to display only safe shopping sites.  Norton Safe Search is completely optional and provides users more control over their search experience. ...
Read More
Kudos1 Stats

Yo Joe!

It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie , we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though. Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy. Throughout the week, pay attention! We’re going to be asking you some trivia questions about G.I. Joe and if you’re the first one to answer the question correctly, you might get one...
Read More
Kudos1 Stats

The New Model of Consumer Protection: Reputation-based security technology

(view in My Videos) In just the past few years, the threat landscape has significantly changed – and traditional antivirus technologies can’t keep up. Attackers generate literally tens of thousands of new malware variants every day, often distributing each variant to just a handful of users. That means that each time a new victim visits an attacker’s web site, a slightly different piece of malware is served up. How can a security vendor ever hope to discover each of these thousands of variants?   We call this problem “server side polymorphism” and we’ve seen it grow over several years. Yo...
Read More
Kudos0

TwitViewer.net - Or How Something That Sounds Too Good to Be True Usually Is

The message might have come in early yesterday on your Twitter feed, "Want to know whos stalking you on twitter!?: http://twitviewer.net/" You might have clicked the link to visit the website. It all happened so fast, the fabulous offer (heck yeah, I want to know who the last 200 people are to look at my Twitter profile!) and the large scale distribution of the "tweet". Even seasoned journalists who should always wear their cynical and world-weary thinking caps fell for it. Yes, Virginia, it was a phishing scam that required people to cough up their Twitter username and password. It's true...
Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos1 Stats

Cybercrime News: Conficker is Spamming, Weak Economy Drives Crime, Why We Click on Spam and More

There's evidence that the Conficker botnet (oh, did you really think they distributed those millions of bots without a plan to monetize them?) is now being used on a "for hire" basis. A story from the UK referencing a new report from Cisco, states that malware called Waledec is being distributed via Conficker's millions of infected computers. Waledec uses your system to send out spam and spread itself to other computers. Before you pull your hair out in frustration, just make sure you've got an up-to-date copy of Norton Internet Security or another comprehensive security product on your co...
Read More
Kudos1 Stats

SONAR 2

SONAR is a behavioral security engine that is at the heart of our antimalware defenses. With the unprecedented growth in malware that has been observed over the last few years, an effective security product has to able to distinguish a bad piece of new binary/software from a good one without the need for a fingerprint.  SONAR, first introduced a couple years ago into the Norton products, has been re-written for the 2010 products to keep pace with today’s threat landscape and take advantage of other new capabilities, such as our Quorum reputation services. Why do we need behavioral security...
Read More
Kudos2 Stats

Microsoft Internet Explorer Unpatched Vulnerability is Here… Norton Users Never Fear!

Normal 0 false false false EN-US X-NONE MicrosoftInternetExplorer4 ...
Read More
Kudos1 Stats

New Feature for Norton Internet Security 2010 - Download Insight

Why Download Insight?Downloading malicious software, typically when tricked into doing so, is becoming the primary way malware infects people’s computers. Nearly every threat today is unique in some way and is designed to evade detection putting tremendous pressure on the traditional signature-based approach. By the time a signature is written for a particular malware variant,  it has already changed itself and as far as the signature is concerned it is an “unknown” file. Whether the signatures are on the disk or in the cloud, they are usually not fast enough to keep pace with modern threa...
Read More
Kudos0

Norton Internet Security 2010 Beta

Norton Internet Security 2010 BetaWelcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta! We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system. To access the Public Beta build, simply navigate to Norton Beta Center and select Norton Internet Security 2010 or Norton AntiVirus 2010. After you complete registrat...
Read More
Kudos0

Live from WWDC 2009

Symantec's Mac product manager, Mike Romo is attending the Apple WW Developer Conference in San Francisco this week and shares some thoughts from this morning's keynote address in this video...Message Edited by Sondra_Magness on 06-08-2009 05:41 PM
Read More
Kudos0

Phishing attacks on Facebook users point to efforts to mine login data for profit

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...
Read More
Kudos1 Stats

Cloud AntiVirus Forecast: Foggy, with a Chance of Irrelevance

We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic. On the heels of RSA, a new “cloud antivirus” (AV) solution has been introduced which ha...
Read More
Kudos1 Stats

Get in the know about Conficker

Symantec's Internet Safety Advocate Marian Merritt gives the lowdown on the Conficker worm and how you can stay protected.For more information on the Conficker worm, visit the Conficker Working Group page at:http://www.confickerworkinggroup.org/wiki/pmwiki.php?n=ANY.RepairToolsorwww.norton.com/conficker
Read More
Kudos1 Stats

Social engineering: meh or muh-oh?

Social engineering: meh or muh-oh? There’s been a lot of news lately about the CanSec security conference where all the major Web browsers were “hacked”. The attack for the Safari Web browser required the user to click on a link, after which complete control of the machine was given to the attacker. Is that a real attack since it required somebody to click on a link? Aren’t viruses all about hacking into somebody’s machine without them doing anything? Not really. The Internet landscape has changed a lot recently. Not too long ago, a virus or worm could infect your computer while it just sa...
Read More
Kudos0

The Latest in the Threat Landscape - Web Based Attacks: February 2009

Normal 0 false false false EN-US X-NONE /...
Read More
Kudos0

Gamer Gets Pwned by His AntiVirus (Episode 3): The Nightmare

Our gamers get set up as the main course in an all-you-can-eat human buffet...
Read More
Kudos1 Stats

Chocolate-Covered PIFTS, X-Files & Mea Culpas

Ever had one of those days? You really intended for things to go right, but they didn’t. And they didn’t simply whimper out of existence, but left large, smoking holes in the living room carpet. That was this Tuesday. In truth, it began on Monday evening around 4:30 p.m. Pacific when we released a patch, the infamously named “pifts.exe,” which left the building before we signed it. This is a process that has worked like clockwork for many years, but due to a simple mistake, the patch wasn’t signed and was instead sent out to Norton AntiVirus and Norton Internet Security customers using th...
Read More
Kudos0

Symantec Comments on PIFTS.exe

 Symantec released a diagnostic patch "PIFTS.exe" targeting Norton Internet Security and Norton Antivirus 2006 & 2007 users on March 9, 2009. This patch was released for approximately 3 hours (4:30 - 7:40 PM March 9, 2009 Pacific Time). In a case of human error, the patch was released by Symantec "unsigned", which caused the firewall user prompt for this file to access the Internet. The firewall alert for the patch caused understandable concern for users and began to be reported back to Symantec. Releasing a patch unsigned is an extremely rare occurrence that does not pose any security ...
Read More
Kudos0

Gamer Gets Pwned by His Antivirus (Episode 2): The Celebration

A N00b MMORPG guild celebrates a great victory and experiences an unexpected defeat. This is the second episode of our "Gamer Gets Pwned by His Antivirus" series.
Read More
Kudos0

Gamer Gets Pwned by his Antivirus (Episode One)

Here is episode one of our "Don't Get Pwned by Your AntiVirus" series...(enjoy)
Read More
Kudos0

Norton Online Family and Fatherhood

Normal 0 false false false EN-US ZH-CN MicrosoftInternetExplorer4 ...
Read More
Kudos0

Are game accounts getting stolen? Really?

How crazy is it that cybercriminals are designing malware to steal log-ins for our online game accounts? Are they really that valuable? I can understand wanting to steal my credit card or bank account number. I can understand wanting to steal my identity so they can open new credit accounts in my name and stick me with the bill.   But, my game account? Really?   Over the last few years, various security companies (including Symantec) and several independent security agencies have published reports about the growing prevalence of Trojans aimed at stealing online game account log-ins. Rece...
Read More
Kudos0

New Trojan Attacks Pirates

  We all know that software piracy is bad--it hurts the people who write software for a living--but it can also be dangerous. Case in point: the recent OSX.Iservice Trojan horse discovered today (January 22nd). Apparently, someone has uploaded Apple’s popular iWork 09 suite and added a Trojan horse to the installer.Some background: When software developers create an installer for the Mac, it's often several mini-installers, or packages, that are run in a particular sequence. Each package (.pkg file) contains specific code and a script makes sure that the code is placed in the right part of...
Read More
Kudos0

Macworld 2009

As Alec Baldwin remarked in State and Main, "Well, that happened." Pretty much sums up this year's MacWorld Expo, which ended this week in San Francisco.  As I have done for several years (my first ad was in 1985), I made the annual pilgrimage to Moscone Center to meet up with my fellow Mac-heads, eager to see what was happening with Apple and other software and hardware makers and just enjoy what the world might be like if everyone used a Mac, if only for a few days.MacWorld's an interesting phenomenon. In the early days of the Macintosh (as we called it back then), it truly was the best ...
Read More
Kudos0

Twitter Users Attacked by Phishing Efforts

Email, cell phones, Facebook and now Twitter all have something in common: they are being used by fraudsters for phishing attacks. If you are a Twitter subscriber you should be aware of these recent phishing efforts and how to protect yourself. You may even have received a warning from Twitter in the past few days. Here's the short and sweet (if I were really good at Twittering, I'd write this entry in 140 character segments but I'll spare you in the interest of getting you the facts): Chris Pirillo broke the story on January 3rd: "Phishing Scam Spreading on Twitter" just a few moments aft...
Read More