How crazy is it that cybercriminals are designing malware to steal log-ins for our online game accounts? Are they really that valuable? I can understand wanting to steal my credit card or bank account number. I can understand wanting to steal my identity so they can open new credit accounts in my name and stick me with the bill.
But, my game account? Really?
Over the last few years, various security companies (including Symantec) and several independent security agencies have published reports about the growing prevalence of Trojans aimed at stealing online game account log-ins. Rece...
Ever had one of those days?
You really intended for things to go right, but they didn’t. And they didn’t simply whimper out of existence, but left large, smoking holes in the living room carpet. That was this Tuesday.
In truth, it began on Monday evening around 4:30 p.m. Pacific when we released a patch, the infamously named “pifts.exe,” which left the building before we signed it. This is a process that has worked like clockwork for many years, but due to a simple mistake, the patch wasn’t signed and was instead sent out to Norton AntiVirus and Norton Internet Security customers using th...
We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic. On the heels of RSA, a new “cloud antivirus” (AV) solution has been introduced which ha...
There's evidence that the Conficker botnet (oh, did you really think they distributed those millions of bots without a plan to monetize them?) is now being used on a "for hire" basis. A story from the UK referencing a new report from Cisco, states that malware called Waledec is being distributed via Conficker's millions of infected computers. Waledec uses your system to send out spam and spread itself to other computers. Before you pull your hair out in frustration, just make sure you've got an up-to-date copy of Norton Internet Security or another comprehensive security product on your co...
A N00b MMORPG guild celebrates a great victory and experiences an unexpected defeat. This is the second episode of our "Gamer Gets Pwned by His Antivirus" series.
Our gamers get set up as the main course in an all-you-can-eat human buffet...
Here is episode one of our "Don't Get Pwned by Your AntiVirus" series...(enjoy)
Symantec's Internet Safety Advocate Marian Merritt gives the lowdown on the Conficker worm and how you can stay protected.For more information on the Conficker worm, visit the Conficker Working Group page at:http://www.confickerworkinggroup.org/wiki/pmwiki.php?n=ANY.RepairToolsorwww.norton.com/conficker
What is IPS?
Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware.
There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Symantec's Mac product manager, Mike Romo is attending the Apple WW Developer Conference in San Francisco this week and shares some thoughts from this morning's keynote address in this video...Message Edited by Sondra_Magness on 06-08-2009 05:41 PM
As Alec Baldwin remarked in State and Main, "Well, that happened." Pretty much sums up this year's MacWorld Expo, which ended this week in San Francisco. As I have done for several years (my first ad was in 1985), I made the annual pilgrimage to Moscone Center to meet up with my fellow Mac-heads, eager to see what was happening with Apple and other software and hardware makers and just enjoy what the world might be like if everyone used a Mac, if only for a few days.MacWorld's an interesting phenomenon. In the early days of the Macintosh (as we called it back then), it truly was the best ...
Microsoft Internet Explorer Unpatched Vulnerability is Here…
Norton Users Never Fear!
You might have heard a few things about a vulnerability in
Microsoft Internet Explorer this week.
This is otherwise known as a “zero day” because it was found and hasn’t
been patched by Microsoft at the time of discovery. You can read more about the actual
vulnerability here in the Microsoft
Security Advisory for CVE-2008-0015.
This bug in Internet Explorer can lead to users having malware installed
on your system silently just by visiting any Web site that might be hosting
malicious code designe...
If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.”
Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Why Download Insight?Downloading malicious software, typically when tricked into doing so, is becoming the primary way malware infects people’s computers. Nearly every threat today is unique in some way and is designed to evade detection putting tremendous pressure on the traditional signature-based approach. By the time a signature is written for a particular malware variant, it has already changed itself and as far as the signature is concerned it is an “unknown” file. Whether the signatures are on the disk or in the cloud, they are usually not fast enough to keep pace with modern threa...
We all know that software piracy is bad--it hurts the people who write software for a living--but it can also be dangerous. Case in point: the recent OSX.Iservice Trojan horse discovered today (January 22nd). Apparently, someone has uploaded Apple’s popular iWork 09 suite and added a Trojan horse to the installer.Some background: When software developers create an installer for the Mac, it's often several mini-installers, or packages, that are run in a particular sequence. Each package (.pkg file) contains specific code and a script makes sure that the code is placed in the right part of...
Norton Internet Security 2010 BetaWelcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta!
We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system.
To access the Public Beta build, simply navigate to Norton Beta Center and select Norton Internet Security 2010 or Norton AntiVirus 2010.
After you complete registrat...
I haven't made a post on here in a while,
and there's a good reason. I've been keeping my head down, working hard
with my teammates on Norton Online
Family. Now that the beta has been released you can see the fruits of
our labor for yourselves.
I am really excited about this
product. I'm not a parent yet, but my wife is expecting our first child
at the end of July so I have spent a lot of time over the last year or so
thinking about what type of father I aspire to be as well as thinking broadly
about the unique problems related to keeping your family safe online. I'm
We’re excited to tell you about the new and improved version of Norton Safe Search, now available as part of the Norton Internet Security 2010 public beta. Norton Safe Search takes the site ratings provided by Norton Safe Web a step further by delivering a fully customized search results page with built-in security features such as filtering out unsafe sites, an interstitial warning page, Privacy Safeguard, and other options such as allowing users to display only safe shopping sites.
Norton Safe Search is completely optional and provides users more control over their search experience. ...
(view in My Videos)Sometimes you need a bodyguard, sometimes you need an advisor
Most often, users are concerned about dangerous, active threats against their computer.
If malware is detected on the PC, users generally prefer that it is simply and quietly blocked. Similarly, when users are online, they expect to be protected from pages that contain malicious content or that are part of phishing scams.
Phishing sites are an obvious, immediate and direct threat on a user’s most valuable information. This is a simple security decision. A webpage is either the correct webpage or it’s an imp...
Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data. Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk. What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.
I’m excited to announce the newest Norton weapon in the fight against PC slugg...
A new wave of phishing attacks on Facebook users is
underway. You'll remember the story from several months back of someone
whose login credentials were stolen and then the crook used that Facebook
access to swindle the victim's friends out of thousands of dollars. The current
effort resembles that one, in that a compromised account sends a malicious
link to friends. The friends click on the link and are taken to a site that
looks just like a Facebook login page. Providing the criminals with their login
and password can sometimes injure the victim beyond the damage to their social
Social engineering: meh or muh-oh?
There’s been a lot of news lately about the CanSec security conference where all the major Web browsers were “hacked”. The attack for the Safari Web browser required the user to click on a link, after which complete control of the machine was given to the attacker. Is that a real attack since it required somebody to click on a link? Aren’t viruses all about hacking into somebody’s machine without them doing anything? Not really. The Internet landscape has changed a lot recently. Not too long ago, a virus or worm could infect your computer while it just sa...
SONAR is a behavioral security engine that is at the heart of our antimalware defenses. With the unprecedented growth in malware that has been observed over the last few years, an effective security product has to able to distinguish a bad piece of new binary/software from a good one without the need for a fingerprint. SONAR, first introduced a couple years ago into the Norton products, has been re-written for the 2010 products to keep pace with today’s threat landscape and take advantage of other new capabilities, such as our Quorum reputation services.
Why do we need behavioral security...
a diagnostic patch "PIFTS.exe" targeting Norton
Internet Security and Norton Antivirus 2006 & 2007 users on March 9, 2009.
This patch was released for approximately 3 hours (4:30 - 7:40 PM
March 9, 2009 Pacific Time). In a case of human error, the patch was
released by Symantec "unsigned", which caused the firewall user prompt for
this file to access the Internet. The firewall alert for the patch caused
understandable concern for users and began to be reported back to Symantec.
Releasing a patch unsigned is an extremely rare occurrence that does not
pose any security ...
As we talk to consumer and enterprise customers, we are
finding many don’t understand the risks of the Internet today, why their
computers have been compromised or how the threat landscape has really
changed. The fact that just visiting
your favorite Web site can either lead to malware silently being installed on
your computer WITHOUT ever clicking on anything, or being plagued by misleading
applications, such as fake antivirus software, seems to be a surprise to many
users and IT managers.
With the increase in Web based attacks that users are
being subjected to every day, we w...
(view in My Videos)
In just the past few years, the threat landscape has significantly changed – and traditional antivirus technologies can’t keep up. Attackers generate literally tens of thousands of new malware variants every day, often distributing each variant to just a handful of users. That means that each time a new victim visits an attacker’s web site, a slightly different piece of malware is served up. How can a security vendor ever hope to discover each of these thousands of variants?
We call this problem “server side polymorphism” and we’ve seen it grow over several years. Yo...
Email, cell phones, Facebook and now Twitter all have something in common: they are being used by fraudsters for phishing attacks. If you are a Twitter subscriber you should be aware of these recent phishing efforts and how to protect yourself. You may even have received a warning from Twitter in the past few days.
Here's the short and sweet (if I were really good at Twittering, I'd write this entry in 140 character segments but I'll spare you in the interest of getting you the facts):
Chris Pirillo broke the story on January 3rd: "Phishing Scam Spreading on Twitter" just a few moments aft...
The message might have come in early yesterday on your Twitter feed, "Want to know whos stalking you on twitter!?: http://twitviewer.net/" You might have clicked the link to visit the website. It all happened so fast, the fabulous offer (heck yeah, I want to know who the last 200 people are to look at my Twitter profile!) and the large scale distribution of the "tweet". Even seasoned journalists who should always wear their cynical and world-weary thinking caps fell for it. Yes, Virginia, it was a phishing scam that required people to cough up their Twitter username and password. It's true...
It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie , we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though.
Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy.
Throughout the week, pay attention! We’re going to be asking you some trivia questions about G.I. Joe and if you’re the first one to answer the question correctly, you might get one...