In this four-part blog series, I briefly review some of the myths we’ve heard about Windows 8 security improvements and point out where deficiencies lie. We believe security should still very much be a concern for anyone running the new Windows 8 OS.
Visit this earlier post to learn more about the series.
Myth #3: Changes to the Windows 8 boot sequence make it secure.
In previous releases of Windows, the boot sequence has been an area ripe for sophisticated attacks against the operating system. During the early phases of loading the Windows OS, there were a number of holes that could b...
In part two of this four-part blog series, I'll continue to review some of the myths we’ve heard about Windows 8 security improvements and point out where deficiencies lie. We believe security should still very much be a concern for anyone running the new Windows 8 OS.
Visit this earlier post to learn more about the series.
Myth #2: Windows 8 is safer because all apps are sandboxed from the rest of the system.
As you likely know if you’ve been following the news around Windows 8, it will introduce a new style of application called the Windows Store app. These apps leverage a new set of...
It has always been in the interest of malware authors to hide their malware on an infected machine. They don’t want to make it easy for security vendors to find and remove their files. Rootkits are one of the most sophisticated methods malware authors use to stay undiscovered.
A rootkit is a tool that allows an attacker to hide a threat on a computer. Rootkits almost never work alone. Instead, an attacker will deliver both a malicious program (e.g., spyware) and an accompanying rootkit when they infect a new computer. The job of the rootkit is to hide telltale signs of both itself and...
I'm Mike Romo and I am the product manager for Norton AntiVirus 12 for Mac and Norton Internet Security 5 for Mac. I am really excited to get this opportunity to welcome you to our beta program and want to be the first to thank you for your interest in our latest products.
Long time Norton users might have noticed that it has been a long time since we have been able to deliver Norton AntiVirus and Norton Internet Security for Mac at the same time. There are a few reasons for this:
- First, these products are specifically designed for MacOS X 10.7, "Lion". We have re-engineered the...
We’re excited to share with you that we have reached another major milestone with Norton DNS. As mentioned in a recent press release update on our Norton Everywhere initiative, we’ve just opened BETA testing of our new Web Content Filtering service within Norton DNS!
This new functionality means that we have extended Norton DNS protection beyond malicious and phishing sites to provide content filtering capability for over 55 million sites, in more than 23 different languages. Users of this new Norton DNS 1.5 beta with Web Content Filtering (BETA) service will be able to create their ow...
We are very excited to release Norton Internet Security and Norton AntiVirus 2011. After undergoing months of Beta testing, getting feedback from our enthusiastic Norton community and incorporating much of that feedback, we are finally releasing what we think are our best products to date.
While this post is somewhat similar to the 2011 Beta post, it has some important additions that warrant an update.
2011 Security Features
In our 2009 products, we introduced Norton Insight which dramatically improved performance by not scanning known good files.
In 2010 products, we w...
This year we have some innovative changes that build upon the successful, effective, and efficient SONAR 2 behavioral security engine. For those who are not familiar with SONAR technology, here is a link to an article that describes it. With SONAR 2, we have a proven track record of being able to convict malware and secure Norton users from malware designed to evade most other security features. In the last nine months alone we prevented upward of 4.2 million infections out of about 140 million incidents that we analyzed for Norton users. Most of these incidents were never-before-seen malw...
Symantec Maximum Repair (SMR) is a brand new security engine that drives our new Norton Power Eraser recovery tool. It combines aggressive heuristics and advanced removal capabilities to combat the newest and toughest threats. I thought I would share with you some of the background on why we developed this new engine.
Why the need?
The threat landscape has radically changed over the last few years and that has driven the need for new approaches to protection. Most notable are the following trends:
A new micro distribution model for malicious threats. A couple of years ago, the norm wa...
What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more:
"Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.
There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.
You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog:
The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox.
Regardless of where the leak originated, this is something we see all too often in the tech and busine...
Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data.
Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT).
The Internet of Things allows wearable devices such ...
The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. Don’t let the numerous deals and distractions cloud your judgment; it’s always important to pay attention to signs that your transactions are secure. You can still shop online and take advantage of Black Friday and Cyber Monday deals with peace of mind. You just have to know what to look for and adhere to simple safety measures.
WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans!
HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY
Date: Thursday December 11th, 2014
Time: Doors at 7:00 pm
Location: Marlin Room @ Webster Hall
U.S. only giveaway
Must be 21+ years old
Concert held at Marlin Room @ Webster Hall 12/11/201...
With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped your list of things to buy. As you search with excitement to find the device that best fulfills your needs, the thought of installing security software on them might not be at the forefront of your mind. However, considering that an alarming 63 percent of mobile device owners fell victim to cybercrime in 2013, it’s important to take steps to keep the information on your mobile devices secure.
Past events continue to substantiate that securing all connected devices is the smartest and easiest ...
We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores.
Remember these key tips to shop safely online:
Don't click on unsolicited emails or links to "deals" that seem to good to be true.
Use the latest, updated version of your internet browser.
Check to ensure your purchases and transactions are taking place on a secure site.
The 12 Scams of Holidays Past
What is the Safest Way to Pay This Holiday Season?
Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts.
In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company...
It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online.
Norton wishes you an exciting (and secure!) year ahead!
Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future. Corporations and even smaller businesses are an extremely attractive target to cybercriminals, simply due to the large payday of data that can be stolen.
What Can Cybercriminals Do With My Stolen Data?
You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now.
What can cybercriminals do with my data in the event of a banking or financial institution breach?
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data...
Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape.
As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy.
What is ridesharing?
Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button. In a...
Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips:
Online Security at Events
Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. Whi...
Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information.
The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Tidy Up Your Digital Life
It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started:
Cleanup your PC workspace: Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized.
Get organized: Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folde...
It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks are becoming the new wave of crime. Corporations and even small businesses are extremely attractive targets to cybercriminals, simply due to the large payday of data that can be nabbed in one fell swoop.
What is a data breach and how and why do they happen?
The main reason that cybercriminals are stealing personal information is for us...
When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies.
New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more.
While jailbreaking an iPhone seems to open up the device to limitless possibilities, it is actually, in fact, a large security risk for your phone. Jailbreaking can allow users to bypass many iOS restrictions they might consider limiting, such as being only able to download apps from the Apple iOS App Store and other types of personal customizations of the device. However, this also means that cybercriminals have access to a much larger security hole to attack the device.
All Apple devices carry a “sandboxing” feature that is native in all OS’s. Sandboxing is a program that essentially ...
Meet Zach Latta, a 17-year-old student who started HackEDU to bring coding to high schools across the country.
Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised by doing nothing more than visiting a website.
With the Internet threat landscape rapidly growing, online crime has become a fact of life. While we read about breaches and identity theft every day in our news outlets, we wanted to better understand Norton Cybersecurity Insights Report how you, the consumer, are impacted on a more human level. The Norton Cybersecurity Insights Report captures how consumers perceive and react to online transactions and threats prevalent on the Internet today.
Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
4.9 billion connected things are expected to be in use in 2015, increasing to 25 billion by 2020. Many of these smart devices can be found in the connected home. Symantec researchers have found that smart home devices have basic security issues, such as weak authentication and common web vulnerabilities. These can be exploited by hackers posing a privacy and security risk.
Safeguards against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks and actionable tips to stay safe in the internet of things...
You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats.
Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same pers...
A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS.
Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body, including a condition known as “text neck.” Extra strain on the muscles from sitting and reading various devices for long periods of time makes tissue sore and inflamed, and can potentially pull your spine out of alignment. Health experts call this damaging posture “forward head posture.”
“Neck muscles, in their proper position, are designed to support the weight of your head, about 10 to ...
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a computer’s hard drive. But what really happens to all that data? Where does it go, and is it really gone forever?
Some people will be relieved to know that, most of the time, deleted files are not permanently gone. Many of us have at one time or another accidently deleted items we did not mean to; in this case the prospect of bringing those files back from the dead is usually good news.
The bad news...
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.
Online socializing has both good and bad sides to it. While it has opened a whole new dimension of ways to communicate and has added convenience to our lifestyles, it unfortunately has some unpleasant effects too.
You’ve heard of malware, ransomware, botnets, and the like. What you don’t hear about is the technology behind these threats. These threats all have to come from somewhere, they’re not just out there floating around on the internet- they have to be stored someplace. Since a majority of these threats are illegal in a lot of countries, this is where bulletproof hosting helps facilitate these threats.
To clearly understand what bulletproof hosting is, we should first take a step back and talk about regular hosting. A regular web hosting service is a company that operates a facility, usually ...
According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online.
To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
Have you ever lost a lot of really important data? Or, alternately, have you ever had a moment of panic where you thought you did? Whether it’s images of a family vacation, a report from work or a semester’s worth of homework, you probably have data on your computer that’s not just valuable, it’s too valuable to lose. Backing up your data regularly will help you to avoid the crushing feeling that comes with finding out that all your hard work and treasured memories are gone.
The Importance of Backing Up
Let’s face it, no matter how great your computer or external hard drive are, one da...
There are more mobile devices on our planet than there are people. It is no surprise that our daily and digital lives have become a seamless unit of existence. Just like your real life, your digital life comes with its own ups and downs. The upside of your digital life is that you can start fresh with a new device and clean up any old hang-ups that can compromise you.
We, at Norton know everything there is to know about the safety of your digital life. We are determined to stay one step ahead of cyber criminals and keep our customers safe.
If you have a new device or PC do not miss our g...
If you’re like most Internet users, you’ve never even heard of grayware, adware or madware. That’s because these are all lower on the threat scale in the world of malicious programming. What’s more, they toe the line between legitimate programs and actively harmful applications.
Here’s your quick guide to the new wave of code you don’t want on your computer:
What Is Grayware?
Grayware is a more succinct name for “potentially unwanted programs.” It’s not a virus and it’s not as obviously malicious as a lot of other problematic code floating around on the Internet. Make no mistake about...