• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

Computer held hostage? Try Norton Power Eraser

Bridging the Gap Norton Power Eraser is the latest Norton Recovery tool. It is being released at the same time as Norton Internet Security and Norton Antivirus 2011. The tool is aimed at detection and clean-up of “0-day” threats (0-day threats are those that take advantage of a newly discovered hole in a program or operating system before the developers have made a fix available – or before they are even aware that a hole exists.) There is special focus on ”Fake AV” (aka ”Rogueware” or ”Crimeware”). Fake AV is a rogue piece of software that pretends to be security software and tempts the ...
Read More
Kudos1 Stats

Testing and Accountability

AMTSO (the Anti-Malware Testing Standards Organization) is a coalition of security professionals, including many antivirus product vendors, product testing organizations and publishers, and some interested individuals. Given the highly technical nature of its activities, it is inevitable that the organization owes some of its authority to the expertise of the security specialists within its ranks, but that doesn’t make it a vendor lobby group. As Kurt Wismer (not himself a member) points out here (http://anti-virus-rants.blogspot.com/2010/06/nss-labs-vs-amtso.html) “many of them are employ...
Read More
Kudos2 Stats

SONAR 3: A new level of behavioral security in Norton 2011

This year we have some innovative changes that build upon the successful, effective, and efficient SONAR 2 behavioral security engine. For those who are not familiar with SONAR technology, here is a link to an article that describes it. With SONAR 2, we have a proven track record of being able to convict malware and secure Norton users from malware designed to evade most other security features. In the last nine months alone we prevented upward of 4.2 million infections out of about 140 million incidents that we analyzed for Norton users. Most of these incidents were never-before-seen malw...
Read More
Kudos3 Stats

What’s new in Norton Internet Security 2011

The new Norton AntiVirus 2011 and Norton Internet Security 2011 beta products include several new and improved features which I'm going to detail here. Security Features Reputation Scan In our 2009 products, we introduced Norton Insight which dramatically improved performance by not scanning known good files. In 2010 products, we went one step further by using reputation data to mark files as good, bad or unknown. With 2011, we are enhancing this even more by providing fine-grained reputation information about files and by allowing users to perform a Reputation Scan of their files. You...
Read More
Kudos1 Stats

The Performance Strategy Behind Norton 2011

A few years ago we threw down the gauntlet, challenging the idea that performance must be traded away in favor of security. To accomplish our mission, we changed ourselves and in the process, changed the entire conversation, shifting the focus to include not only effectiveness and accuracy but minimum performance impact felt by the customer. But we’re an industry leader, so rehashing the previous cutting-edge methods won’t do. In 2011, we’ve picked up our own challenge and turned in a new direction, pushing ourselves to go even farther for the betterment of our customers. In order to do...
Read More
Kudos1 Stats

Got an Idea? Tell us!

Got an Idea? Tell us! Have you ever used a product and thought “if only it had this feature…” or “if I could just do that easier” wishing you could spend a few minutes with the developers to hear you out?  Well, today we’re excited to introduce a new section of the Norton Community called Norton Ideas which will allow you to do just that.  Norton Ideas is a site that will allow you to submit your product feature suggestions directly to the Norton product development team.  The Norton product team is here to listen to your suggestions, discuss them amongst the community and put the best id...
Read More
Kudos1 Stats

Apple Announces the iPad

As I write this--about 15 minutes before Apple's "Newest Creation" event is set to begin--I feel, if the hype is to be believed, that I am writing this on a piece of papyrus, musing on the concept of the printing press.  I think it is fair to say that this morning's presentation is the most anticipated technology announcment in Apple's history, if not of all time…and we are not even sure if Apple's actually going to announce it! "It," of course, refers to Apple's entry into the tablet market, the next wave of computing, which does away with the standard keyboard/mouse/screen computer and ...
Read More
Kudos1 Stats

Norton Utilities Premier – New!

Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data.  Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk.  What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.  I’m excited to announce the newest Norton weapon in the fight against PC slugg...
Read More
Kudos0

Microsoft Security Essentials: “Reruns” Aren’t Just for TV Anymore

If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.” Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos1 Stats

Cloud AntiVirus Forecast: Foggy, with a Chance of Irrelevance

We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic. On the heels of RSA, a new “cloud antivirus” (AV) solution has been introduced which ha...
Read More
Kudos1 Stats

Norton Account

One of the exciting features of Norton products is their ability to be managed using Norton Account.  Norton Account is great because it enables you to have complete control of all of your Norton Product Subscriptions and Keys in one convenient place.  From Norton AntiVirus to Norton 360, you can update, view and edit all of their information.  I know a lot of users find Norton Account great because it enables you to easily retrieve your product key for re-installation of your Norton product.   Norton Account allows you to log in from any computer in the world and instantly see the Norton ...
Read More
Kudos2 Stats

What's driving Norton Power Eraser?

Symantec Maximum Repair (SMR) is a brand new security engine that drives our new Norton Power Eraser recovery tool. It combines aggressive heuristics and advanced removal capabilities to combat the newest and toughest threats. I thought I would share with you some of the background on why we developed this new engine.   Why the need? The threat landscape has radically changed over the last few years and that has driven the need for new approaches to protection. Most notable are the following trends: A new micro distribution model for malicious threats. A couple of years ago, the norm wa...
Read More
Kudos0

Introducing Norton Labs

Today, the Norton team is excited to introduce Norton Labs, an online community where users can download new security technologies and share input directly with developers-- ultimately helping to shape our future products and features.  We created Norton Labs to foster a dialogue with our customers and bring them into our development process.  It gives us an outlet to showcase technology under development and get valued feedback from our most sophisticated users.  Also, Norton Labs gives us the flexibility to introduce key functionality outside of our standard development cycle.  Based on ...
Read More
Kudos2 Stats

Heartbleed Bug: What You Need to Know and Security Tips

What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more: "Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Read More
Kudos1 Stats

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More
Kudos1 Stats

Android AOSP Browser Bug Could Affect 75 Percent Of Users

A new Android vulnerability, which could allow attackers to view open Web pages on the victim’s Android Web browser or hijack their online accounts, has recently been uncovered, and may impact an estimated 75 percent of android users.   Uncovered in early September, by security researcher, Ray Baloch, the Google Android Browser Same Origin Policy Security Bypass Vulnerability (CVE-2014-6041) reportedly affects any Android version below 4.4. The bug, found in the Android Open Source Project browser (or AOSP browser—a browser that Google no longer supports), could be exploited by an attacke...
Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos1 Stats

The Worm in the Apple, Part 3 - How to Secure Your iPhone and iCloud in Light of Recent Photo Leaks

We're sure you've heard about the multitude of celebrity photos that were leaked from iCloud accounts. Read on to find out how it was done, and how you can secure your own iCloud account to make sure something like that doesn't happen to you.

Read More
Kudos1 Stats

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1 Stats

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos3 Stats

The New Norton

Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.

Read More
Kudos1 Stats

Mobile Scams: How-to Identify Them and Protect Yourself

With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.

Read More
Kudos1 Stats

How To Protect Yourself From Cyberstalkers

With the wealth of information available online, this makes it easier for Cyberstalkers to gain access to their victims. Read on to learn about ways to keep your personal information hidden from unwanted eyes.

Read More
Kudos1 Stats

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.

Read More
Kudos1 Stats

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.

Read More
Kudos2 Stats

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.

Read More
Kudos4 Stats

Shellshock, The Latest Mac OSX and Linux Vulnerability—And What It Means For You


Security researchers have discovered a new bug, called, Shellshock, that affects Linux and Unix platforms. If exploited, the bug could impact public facing web servers and Mac OSX users. Our experts let you know what you can do to keep your data safe.

Read More
Kudos1 Stats

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos2 Stats

Exactly How Free Is That Free App?

There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.

Read More
Kudos1 Stats

BYOD And Protecting Your Mobile Workforce

BYOD is growing in popularity within small businesses. In this article we will discuss how to let your employees use their own devices and keep your company's data safe.

Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
Read More
Kudos0

Cyber Security Concerns and Smartphones

More people own smartphones than PCs in today's market, and that makes the mobile platform extremely desirable to cybercriminals. Learn how to secure your personal data.

Read More
Kudos1 Stats

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.

Read More
Kudos2 Stats

My Account May Have Been Hacked—What To Do Now?

You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox. Regardless of where the leak originated, this is something we see all too often in the tech and busine...
Read More
Kudos1 Stats

Norton business announcement. Norton continues to Go Boldly

Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...

Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos4 Stats

Cookies and Your Online Privacy: #30SecTech video

Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out. First, an introduction to cookies Cookies are small text files that are placed on your computer or mobile device by websites you visit or certain emails you open. In essence a cookie notif...
Read More
Kudos2 Stats

Traveling? Don’t Let Your Mobile Data Stray

Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data. 

Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos5 Stats

The Real Cost of Free: #30SecTech Video

With plenty of free security software options out there, it’s easy to wonder why you would want to pay for online protection. But is free antivirus software truly free? Internet connected devices are constantly within reach and as a result more aspects of our lives and information reside within our devices than ever before. Yet many people still see their online world and the physical world as separate from each other, not realizing that online information is as valuable to cyber criminals as a wallet is to a mugger. It’s not until a data breach makes headlines t...
Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream me...
Read More
Kudos5 Stats

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More