Got an Idea? Tell us!
Author: athena27 Employee Posted: 01-Apr-2010 | 11:10AM · Edited: 05-Mar-2020 | 10:04AM · 13 Comments
Got an Idea? Tell us!
Please Sign In with Norton Account to Ask a Question or comment in the Community
Author: athena27 Employee Posted: 01-Apr-2010 | 11:10AM · Edited: 05-Mar-2020 | 10:04AM · 13 Comments
Got an Idea? Tell us!
Author: MarkKennedy27 Employee Posted: 07-Jul-2010 | 1:24PM · 1 Comment
AMTSO (the Anti-Malware Testing Standards Organization) is a coalition of security professionals, including many antivirus product vendors, product testing organizations and publishers, and some interested individuals. Given the highly technical nature of its activities, it is inevitable that the organization owes some of its authority to the expertise of the security specialists within its ranks, but that doesn’t make it a vendor lobby group.
Author: robertreynolds27 Employee Posted: 14-Oct-2009 | 11:24AM · Edited: 05-Mar-2020 | 10:04AM · 16 Comments
Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data. Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk. What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.
Author: sourabhsatish27 Employee Posted: 23-Apr-2010 | 11:47AM · 6 Comments
This year we have some innovative changes that build upon the successful, effective, and efficient SONAR 2 behavioral security engine. For those who are not familiar with SONAR technology, here is a link to an article that describes it. With SONAR 2, we have a proven track record of being able to convict malware and secure Norton users from malware designed to evade most other security features.
Author: dong_chung27 Employee Posted: 19-Apr-2010 | 12:27AM · 1 Comment
Author: Ameya27 Employee Posted: 28-Jul-2009 | 2:10PM · 7 Comments
What is IPS?
Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware.
Author: adam_schepis27 Employee Posted: 24-Feb-2009 | 3:35AM · 1 Comment
I haven't made a post on here in a while,
and there's a good reason. I've been keeping my head down, working hard
with my teammates on Norton Online
Family. Now that the beta has been released you can see the fruits of
our labor for yourselves.
Author: abhay_kulkarni27 Employee Posted: 19-Apr-2010 | 7:04PM · Edited: 05-Mar-2020 | 10:04AM · 6 Comments
The new Norton AntiVirus 2011 and Norton Internet Security 2011 beta products include several new and improved features which I'm going to detail here.
Security FeaturesIn our 2009 products, we introduced Norton Insight which dramatically improved performance by not scanning known good files.
In 2010 products, we went one step further by using reputation data to mark files as good, bad or unknown.
Author: MarkKennedy27 Employee Posted: 12-Nov-2008 | 3:16PM · 3 Comments
Author: GavinA27 Employee Posted: 31-Aug-2009 | 2:26PM · 7 Comments
Sometimes you need a bodyguard, sometimes you need an advisor
Most often, users are concerned about dangerous, active threats against their computer.
If malware is detected on the PC, users generally prefer that it is simply and quietly blocked. Similarly, when users are online, they expect to be protected from pages that contain malicious content or that are part of phishing scams.
Author: John_Harrison27 Employee Posted: 24-Mar-2009 | 10:47AM · 8 Comments
As we talk to consumer and enterprise customers, we are finding many don’t understand the risks of the Internet today, why their computers have been compromised or how the threat landscape has really changed. The fact that just visiting your favorite Web site can either lead to malware silently being installed on your computer WITHOUT ever clicking on anything, or being plagued by misleading applications, such as fake antivirus software, seems to be a surprise to many users and IT managers.
Author: mikeromo27 Employee Posted: 27-Jan-2010 | 2:35PM · Edited: 05-Mar-2020 | 10:04AM · 4 Comments
As I write this--about 15 minutes before Apple's "Newest Creation" event is set to begin--I feel, if the hype is to be believed, that I am writing this on a piece of papyrus, musing on the concept of the printing press. I think it is fair to say that this morning's presentation is the most anticipated technology announcment in Apple's history, if not of all time…and we are not even sure if Apple's actually going to announce it!
Author: careyn27 Employee Posted: 03-Aug-2009 | 3:31PM · Edited: 05-Mar-2020 | 10:04AM · 8 Comments
MoreAuthor: marianmerritt27 Employee Posted: 17-Jul-2009 | 7:05AM · 3 Comments
There's evidence that the Conficker botnet (oh, did you really think they distributed those millions of bots without a plan to monetize them?) is now being used on a "for hire" basis.
Author: Travis_wilkins27 Employee Posted: 18-Dec-2008 | 4:34PM · 4 Comments
It seems like having a computer equates to having PC problems. We've all been there. You are sitting at your desk and your computer's speed is crawling while you are trying to get something done. Very frustrating. It's not clear what the problem is exactly, but it is clear that your computer isn't running as fast as it use to. You think maybe it's all of the music and photos you've downloaded? Or maybe it's just the fact that your computer is a couple of years old?
Author: mikeromo27 Employee Posted: 14-Jan-2009 | 3:03PM · 1 Comment
As Alec Baldwin remarked in State and Main, "Well, that happened." Pretty much sums up this year's MacWorld Expo, which ended this week in San Francisco. As I have done for several years (my first ad was in 1985), I made the annual pilgrimage to Moscone Center to meet up with my fellow Mac-heads, eager to see what was happening with Apple and other software and hardware makers and just enjoy what the world might be like if
Author: John_Harrison27 Employee Posted: 09-Jul-2009 | 3:46PM · 5 Comments
Microsoft Internet Explorer Unpatched Vulnerability is Here… Norton Users Never Fear!
Author: ViralM27 Employee Posted: 02-Jul-2009 | 6:41PM · Edited: 05-Mar-2020 | 10:04AM · 15 Comments
Why Download Insight?
Author: Sondra_Magness27 Employee Posted: 05-Aug-2009 | 2:44PM · Edited: 05-Mar-2020 | 10:04AM · 1 Comment
It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie [www.norton.com/gijoe], we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though.
Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy.
Author: ViralM27 Employee Posted: 02-Jul-2009 | 6:30PM · 1 Comment
Norton Internet Security 2010 Beta
Welcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta!
We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system.
Author: marianmerritt27 Employee Posted: 29-Jul-2009 | 10:46AM · 0 Comments
Author: Sondra_Magness27 Employee Posted: 08-Jun-2009 | 5:39PM · 1 Comment
Author: marianmerritt27 Employee Posted: 14-May-2009 | 7:38PM · 2 Comments
A new wave of phishing attacks on Facebook users is underway. You'll remember the story from several months back of someone whose login credentials were stolen and then the crook used that Facebook access to swindle the victim's friends out of thousands of dollars. The current effort resembles that one, in that a compromised account sends a malicious
Author: davecole27 Employee Posted: 12-Mar-2009 | 9:12PM · 9 Comments
Ever had one of those days?
You really intended for things to go right, but they didn’t. And they didn’t simply whimper out of existence, but left large, smoking holes in the living room carpet. That was this Tuesday.
Author: davecole27 Employee Posted: 04-May-2009 | 5:48PM · 1 Comment
We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic.
Author: ryan_mcgann27 Employee Posted: 27-Mar-2009 | 1:46PM · 0 Comments
Social engineering: meh or muh-oh?
Author: JeffKyle27 Employee Posted: 10-Mar-2009 | 2:20PM · 1 Comment
Author: deena_monchick27 Employee Posted: 05-Mar-2009 | 10:13AM · 0 Comments
A N00b MMORPG guild celebrates a great victory and experiences an unexpected defeat. This is the second episode of our "Gamer Gets Pwned by His Antivirus" series.
Author: deena_monchick27 Employee Posted: 24-Feb-2009 | 5:52PM · 1 Comment
Here is episode one of our "Don't Get Pwned by Your AntiVirus" series...(enjoy)
Author: deena_monchick27 Employee Posted: 19-Feb-2009 | 3:59PM · 0 Comments
How crazy is it that cybercriminals are designing malware to steal log-ins for our online game accounts? Are they really that valuable? I can understand wanting to steal my credit card or bank account number. I can understand wanting to steal my identity so they can open new credit accounts in my name and stick me with the bill.
But, my game account? Really?
Author: John_Harrison27 Employee Posted: 28-Aug-2008 | 10:15AM · 2 Comments
In the old days, practicing “safe Internet” meant staying in the good online neighborhoods so you didn’t get infected. Today, almost any website you visit could be a landmine leading you to having your system compromised. We all remember the quote from Austin Powers where Dr. Evil says “One MILLION dollars”. Now imagine a techie version of Dr. Evil, let’s call him “Dr. Drive-by” saying in that same tone “One MILLION websites compromised”. Drive-by download outbreaks can be measured in how many occurrences a particular domain name occurs in Google searches.
Author: adam_schepis27 Employee Posted: 29-Oct-2008 | 9:40AM · 3 Comments
Author: kunal_symc27 Employee Posted: 29-Aug-2008 | 5:17PM · 7 Comments
Hello, my name is Kunal Karandikar and I am a Manager on Symantec’s Consumer Products Engineering team. My colleagues and I are excited about Norton Insight, a brand new feature to the 2009 Norton product line. There have been a lot of questions about how it works and what it does. In fact, there have been a few articles published recently that have compared Norton Insight with other technologies which we think are actually somewhat different, and believe do not really match up well to our new feature.
Author: dong_chung27 Employee Posted: 09-Sep-2008 | 6:22AM · 7 Comments
To our Norton Customers:
Author: marianmerritt27 Employee Posted: 04-Jan-2009 | 11:31AM · 0 Comments
Email, cell phones, Facebook and now Twitter all have something in common: they are being used by fraudsters for phishing attacks. If you are a Twitter subscriber you should be aware of these recent phishing efforts and how to protect yourself. You may even have received a warning from Twitter in the past few days.
Here's the short and sweet (if I were really good at Twittering, I'd write this entry in 140 character segments but I'll spare you in the interest of getting you the facts):
Author: MikeO27 Employee Posted: 08-Sep-2008 | 11:20AM · 2 Comments
Every day, corporations, governments, and individuals must live with security vs.
Author: deena_monchick27 Employee Posted: 24-Nov-2008 | 11:54PM · 1 Comment
A year ago we reached out to the gamer community at DreamHack in Sweden to find out what they wanted from their anti virus software and more specifically what they didn’t want. Their biggest request was for anti virus that didn’t use up precious PC resources. They also asked for security software that wouldn’t interrupt them when they were gaming. Some of them even asked for anti virus that would automatically change its mode of operation to accommodate them appropriately when they were gaming versus when they were surfing.
Author: GUEST_BLOGGER1 Posted: 21-Aug-2008 | 4:28PM · 5 Comments
You remember the Shoemaker’s lesson, don’t you? It’s always the shoemaker’s children go barefoot. And so it was that after thirty years of writing about PCs and wagging my finger at those who tempted fate by not backing up regularly, I did it myself. The entire episode has made me feel a little addle-brained, a lot chagrined, and like a cautionary tale.
Author: robertreynolds27 Employee Posted: 16-Oct-2008 | 8:02PM · 2 Comments
Whether it’s defragging, cleaning and repairing the hard drive, maintaining your PC with a one-click checkup tool, or getting rid of unwanted Internet clutter, Norton SystemWorks delivers a comprehensive toolkit for faster, up-to-the-minute performance boosting utility tools.
Author: ChristopherA27 Employee Posted: 02-Oct-2008 | 1:22PM · 6 Comments
The Norton Pulse Updates Feature
Summary
It’s a simple truth: The faster virus definitions are received, the better the protection is for the computer. Norton 2009 has added a new technology, called Norton Pulse Updates, which downloads new virus definitions almost as soon as they are created, without sacrificing reliability or performance.
Author: John_Harrison27 Employee Posted: 25-Sep-2008 | 11:06AM · 0 Comments
Are you Naked? Exploits from the latest Microsoft Vulnerability seen in the wild
Which is worse, being seen naked running down the street or having a vulnerable computer leaving you exposed to attacks from drive-by downloads? It is probably a matter of opinion (or local laws.) Unfortunately, I think people are more concerned about being seen naked than whether they have a computer that is vulnerable. Don’t get caught being exposed by having a vulnerable system!
Author: Rowan_Trollope27 Employee Posted: 16-Sep-2008 | 5:05PM · 0 Comments
This past weekend I was joined by an international group of journalists and bloggers for a Zero-Gravity flight to “blast off” the launch of the Norton 2009 security products. This 18-person “band of brothers” boarded the G-Force One in Las Vegas, prepared to float, flip and fly the way orbiting astronauts do. One word describes the experience - awesome. But most people want to know, what in the world does a Zero-G flight have to do with security software?
Author: davecole27 Employee Posted: 14-Aug-2008 | 11:24AM · 4 Comments
In recent years, Consumer Reports (CR) decided to take on reviewing security software in addition to the scores of energy drinks, vacuum cleaners and toasters they put through the paces annually.
Author: adam_schepis27 Employee Posted: 28-May-2008 | 7:02PM · 3 Comments
A recent PCMag.com blog post points out that the fake White House website whitehouse.org (no, I won't link you to it) has been hacked and is serving up malware. Part of the issue here is that many people attempting to go to the government website www.whitehouse.gov will accidentally mistype it as whitehouse.org. This
Author: lauragm_us27 Employee Posted: 20-Aug-2008 | 4:11PM · 3 Comments
Today, the Norton team is excited to introduce Norton Labs, an online community where users can download new security technologies and share input directly with developers-- ultimately helping to shape our future products and features.
Author: adam_schepis27 Employee Posted: 22-Aug-2008 | 11:57AM · 2 Comments
I was surfing the web tonight and I came across an article on Scientific American. The author asked some friends for permission to break into their bank accounts and then went to work trying to steal their identity. The ease at which he was able to do so is startling.
Author: Rowan_Trollope27 Employee Posted: 09-Apr-2008 | 4:31PM · 2 Comments
This Blog is dedicated to you - as a past, present or future user of our products. A large team of our product managers, engineering, testers and designers will regularly be posting directly to this blog. Each of us care passionately about security, and share the responsibility to design, develop and test the solutions that protect our customers.
Author: adam_schepis27 Employee Posted: 05-Aug-2008 | 2:24AM · 0 Comments
The Boston Globe had an article recently on how difficult it is to be anonymous in the internet age. Reading the article compelled me to perform my every-once-in-a-while "googling" of myself. What I found was pretty interesting.
Author: adam_schepis27 Employee Posted: 11-Jun-2008 | 12:02PM · 1 Comment
Author: mikeromo27 Employee Posted: 17-Jul-2008 | 11:38AM · 1 Comment
So, this is a bit of a deviation from our standard security-focused articles, but given how you can't go 15 minutes without hearing about the iPhone 3G, I think it's appropriate to bring it up. I have an original iPhone (4GB!) and was able to successfully download the new iPhone software before the mad rush and figured I would share some observations after a full week or so of using the software.