• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

May The Fourth Be With You

Did you know that there was more than one Death Star? What’s more, the destruction of each one of them was via one vulnerability, or weakness in the whole system. To celebrate May the Fourth we’re taking a look at vulnerabilities that nearly ended the Empire. Whichever side you choose, don’t become a victim to software vulnerabilities. As the story goes: A long time ago, in a galaxy far, far away… The Death Star I was designed to be an impenetrable fortress and a symbol of the Emperor’s hold on the galaxy. In case you’re not familiar with it, the Death Star is a fully contained; moon s...
Read More
Kudos2 Stats

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...
Read More
Kudos2 Stats

How a Gmail Password Stealing Scam Works

Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to protect yourself from this email password stealing scam. Who is affected? Symantec researchers have found this scam largely targets Gmail, Hotmail, and Yahoo Mail users. However, everyone with an email account should be aware of how this scam works to avoid falling victim. See how the scam works. In just a few quick steps, cybercriminals trick victims into disclosing email ...
Read More
Kudos2 Stats

The Day I Thought Cybercriminals Left Me For Dead

Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for a moment out of shock, and assured her I was very much alive and well. She went on to explain how she’d never seen anything like it before. As the initial shock wore off, we started to have a bit of a laugh on how bizarre this was. 

Read More
Kudos2 Stats

Watch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That Took Down a Nuclear Power Plant

Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the years. However, brief news reports don’t even begin to uncover the darkness of this threat. In “Zero Days,” director Alex Gibney takes a deeper look at the sophisticated piece of weapons-grade malware that destroyed a part of an Iranian nuclear facility, as well as help facilitate espionage by spying on its target. This thrilling documentary discusses the complexity of the virus with Sy...
Read More
Kudos2 Stats

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps? How Mobile Payment Apps Work You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos2 Stats

What Is a No-Log VPN Network?

Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider.

Read More
Kudos2 Stats

How To Talk to Your Kids About Cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard. According to a 2015 survey 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online. This onslaught of hateful messag...
Read More
Kudos2 Stats

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls. 

Read More
Kudos2 Stats

Can the Elections Get Hacked?

The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can we possibly know? A Symantec security expert recently demonstrated just what a motivated hacker can do to undermine the election by hacking an electronic voting machine.  Can Hackers Hack the Election? At the Black Hat convention this year, Symantec’s Brian Varner demonstrated a security flaw in an electronic voting machine and the smart card a voter would use to place their vote. Using...
Read More
Kudos2 Stats

Holiday Travelers' Tips for Device Security in Airports

As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport. 

Read More
Kudos2 Stats

12 Days of Norton Tips

We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year.

Read More
Kudos2 Stats

Online Christmas Shopping: Naughty or Nice?

Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online. Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online. While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of peop...
Read More
Kudos2 Stats

Norton Introduces Elegantly Designed Norton Core- A Digital Safety Solution for Connected Homes

New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security Mountain View, Calif. – Jan. 3, 2017 – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for pre-orders today and will change the way people secure their connected homes. Today’s home networks, b...
Read More
Kudos2 Stats

How to Spot a Fake Android App

Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Read More
Kudos1 Stats

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this “news” may not be what it seems. In 2016, Facebook has reported that it has 1.71 billion monthly active Facebook users. Twitter has 313 million monthly active users. With so many active users, popular social sites are a scammer's paradise. Scammers will try to entice you into clicking by posting sensational or emotional bre...
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos1 Stats

Tips to Protect Your Financial Information

Protecting your financial information is important, and it doesn’t have to be difficult. When on-the-go tools such as mobile banking apps make managing financial tasks easy, you should also take precautions to manage the risk of accessing sensitive financial information anytime, anywhere. This Credit Education Month, practice safe online habits with a few easy tips. Taking Basic Security Precautions Take precautions to make sure that your online financial management activities are secure. Be aware and vigilant by practicing these safe online habits: Make sure the websites with which you...
Read More
Kudos1 Stats

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus. There are the obvious precautions to take in protecting your devices, such as never le...
Read More
Kudos1 Stats

Data Breach - The Best Defense is Vigilance

There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is understanding what the thieves are after, so you can make it harder for them to win. Egan answers some commonly asked questions about shopping and credit card safety: So what is being stolen and how is it being used? In point of sale (POS) breaches, thieves are stealing your 16-digit credit card numbers. Those numbers are most useful to thieves (and ...
Read More
Kudos1 Stats

Scammers' Tricks You Don’t Want To Be Fooled By

Unlike April Fools, which only happens once a year, scammers make a living off of fooling users 365 days a year. Here are a number of tricks that scammers use. Phishing Scams: Whether it’s pretending to be your financial institution or a tweet from someone you know, asking, “Is this photo of you?”, phishing scams are after your login credentials to sites that are important to you. Recently, users of Google Drive and Google Docs were targeted in a sophisticated phishing scam. Phishing remains one of the most common scams used because they work, and as these scams become more innovative, th...
Read More
Kudos1 Stats

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to b...
Read More
Kudos1 Stats

Time-Saving Software To Simplify Your Life

There’s no doubt that technology has made many areas of our lives simpler. We can now access files from any device, anywhere, and we can take full advantage of fast internet speeds to do things that weren’t possible just a few years ago. But as we use more technology, that simplicity can be eroded as our devices demand monthly, weekly, even daily updates. Our software applications add new features we didn’t ask for but have to learn and our documents move from one hard disk to multiple locations around the cloud, each with their own logins and capacity limits. Technology can greatly impro...
Read More
Kudos1 Stats

How Safe Is That App? Mobile Security Expert Tips To Help Protect Your Mobile Device.

Mobile apps have transformed the way we interact with our smartphones and tablets. If you’re looking for a quick way to access your bank accounts, a tool to make you more productive while on the move, or a game to help pass the time while you’re waiting for a bus, there’s an app for that. In fact, with over 1 million apps on Google Play, for instance, there are often thousands of options to choose from in each app category. The fact that many can be downloaded in a matter of seconds means that you’re only ever moments away from installing a tool that could bring innovative new functionali...
Read More
Kudos1 Stats

Securing Your Small Business Social Media Plan

Today's social media is a crucial tool for business,  Companies that use Twitter, Facebook and other tools in an organised and efficient manner can achieve incredible engagement for relatively little cost, and (with a healthy dose of good fortune) a strong social media campaign can take off around the world and do more for brand recognition than traditional advertising. The key is finding the right balance between informal spontaneity and well-planned company output, and it’s a balance a huge number of businesses are finding hard to get right. Engaging with customers and listening to cons...
Read More
Kudos1 Stats

Security Experts 'Pin' So-Called Miracle Diets As Social Scams

Obesity is a known topic of conversation in the United States, with one in three U.S. adults being categorized as overweight. Most of us have come across posts claiming to promote a new weight loss "miracle" in our online experiences. Healthcare experts are constantly reporting that there is "no such thing" as a miracle diet, but, much like a fabled lake monster, or a giant hairy beast in the woods, legends die hard.  Scammers are always trying to find new ways to lure in vulnerable dieters who still want to believe that an easy solution exists. They use social media as a vehicle to peddle...
Read More
Kudos1 Stats

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device. Earlier this year, Symantec’s Internet Security Threat Report noted that mobile malware in 2013 was developed almost exclusively for the Android OS, 32% of which steals a user’s personal information. Luckily, Google says that no e...
Read More
Kudos1 Stats

Chocolate-Covered PIFTS, X-Files & Mea Culpas

Ever had one of those days? You really intended for things to go right, but they didn’t. And they didn’t simply whimper out of existence, but left large, smoking holes in the living room carpet. That was this Tuesday. In truth, it began on Monday evening around 4:30 p.m. Pacific when we released a patch, the infamously named “pifts.exe,” which left the building before we signed it. This is a process that has worked like clockwork for many years, but due to a simple mistake, the patch wasn’t signed and was instead sent out to Norton AntiVirus and Norton Internet Security customers using th...
Read More
Kudos1 Stats

A "How-To" on Manually Updating the Norton Recovery Tool

If you've recently purchased one of the 2009 Norton products, you may have noticed that this year, it came with something new - the Norton Recovery Tool. To avoid confusion between the Norton Removal Tool (NRT) and the Norton Recovery Tool, I will instead refer to the solution as the Norton Recovery Disc (NRD). For many of our users, this tool will never play a part in their security software experience, but for those who need it, it can be a life saver. So what is the Norton Recovery Disc, and when would you ever need to use it? The NRD is a bootable CD that can run scans and remove threa...
Read More
Kudos1 Stats

Norton Safe Search – New and Improved

We’re excited to tell you about the new and improved version of Norton Safe Search, now available as part of the Norton Internet Security 2010 public beta.  Norton Safe Search takes the site ratings provided by Norton Safe Web a step further by delivering a fully customized search results page with built-in security features such as filtering out unsafe sites, an interstitial warning page, Privacy Safeguard, and other options such as allowing users to display only safe shopping sites.  Norton Safe Search is completely optional and provides users more control over their search experience. ...
Read More
Kudos1 Stats

Yo Joe!

It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie , we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though. Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy. Throughout the week, pay attention! We’re going to be asking you some trivia questions about G.I. Joe and if you’re the first one to answer the question correctly, you might get one...
Read More
Kudos1 Stats

The New Model of Consumer Protection: Reputation-based security technology

(view in My Videos) In just the past few years, the threat landscape has significantly changed – and traditional antivirus technologies can’t keep up. Attackers generate literally tens of thousands of new malware variants every day, often distributing each variant to just a handful of users. That means that each time a new victim visits an attacker’s web site, a slightly different piece of malware is served up. How can a security vendor ever hope to discover each of these thousands of variants?   We call this problem “server side polymorphism” and we’ve seen it grow over several years. Yo...
Read More
Kudos1 Stats

Cybercrime News: Conficker is Spamming, Weak Economy Drives Crime, Why We Click on Spam and More

There's evidence that the Conficker botnet (oh, did you really think they distributed those millions of bots without a plan to monetize them?) is now being used on a "for hire" basis. A story from the UK referencing a new report from Cisco, states that malware called Waledec is being distributed via Conficker's millions of infected computers. Waledec uses your system to send out spam and spread itself to other computers. Before you pull your hair out in frustration, just make sure you've got an up-to-date copy of Norton Internet Security or another comprehensive security product on your co...
Read More
Kudos1 Stats

SONAR 2

SONAR is a behavioral security engine that is at the heart of our antimalware defenses. With the unprecedented growth in malware that has been observed over the last few years, an effective security product has to able to distinguish a bad piece of new binary/software from a good one without the need for a fingerprint.  SONAR, first introduced a couple years ago into the Norton products, has been re-written for the 2010 products to keep pace with today’s threat landscape and take advantage of other new capabilities, such as our Quorum reputation services. Why do we need behavioral security...
Read More
Kudos1 Stats

Get in the know about Conficker

Symantec's Internet Safety Advocate Marian Merritt gives the lowdown on the Conficker worm and how you can stay protected.For more information on the Conficker worm, visit the Conficker Working Group page at:http://www.confickerworkinggroup.org/wiki/pmwiki.php?n=ANY.RepairToolsorwww.norton.com/conficker
Read More
Kudos1 Stats

Social engineering: meh or muh-oh?

Social engineering: meh or muh-oh? There’s been a lot of news lately about the CanSec security conference where all the major Web browsers were “hacked”. The attack for the Safari Web browser required the user to click on a link, after which complete control of the machine was given to the attacker. Is that a real attack since it required somebody to click on a link? Aren’t viruses all about hacking into somebody’s machine without them doing anything? Not really. The Internet landscape has changed a lot recently. Not too long ago, a virus or worm could infect your computer while it just sa...
Read More
Kudos1 Stats

New Feature for Norton Internet Security 2010 - Download Insight

Why Download Insight?Downloading malicious software, typically when tricked into doing so, is becoming the primary way malware infects people’s computers. Nearly every threat today is unique in some way and is designed to evade detection putting tremendous pressure on the traditional signature-based approach. By the time a signature is written for a particular malware variant,  it has already changed itself and as far as the signature is concerned it is an “unknown” file. Whether the signatures are on the disk or in the cloud, they are usually not fast enough to keep pace with modern threa...
Read More
Kudos1 Stats

Introducing Norton Anti-Theft Beta

Hi, I’m Joe Keehnast, product manager for Norton Anti-Theft, a new Beta service from Norton.  Norton Anti-Theft is a new service that gives you a way to track the devices you have, protect the data they house, and get them back in the event that they are ever lost or stolen. Protecting users from the threat of physical device loss and theft is somewhat of a new area for us and we believe this new service is a great addition to our Norton Everywhere vision of protecting you and your data on any device. So what can Norton Anti-Theft do for you?   Let’s say you have lost a computer or it has...
Read More
Kudos1 Stats

Norton Identity Safe Beta

We are excited to announce the Beta launch of Norton Identity Safe Standalone. Norton Identity Safe takes away the pain of having to remember multiple passwords and securely stores important information such as credit cards numbers, addresses, and phone numbers. Please visit https://identitysafe-beta.norton.com/ to try the Beta. Overview Passwords have become a way of life for every computer user. They are one of the most popular methods of user authentication on the Internet. They are used to check emails, access bank accounts, watch movies, play games, and a lot more. The world would be...
Read More
Kudos1 Stats

Computer held hostage? Try Norton Power Eraser

Bridging the Gap Norton Power Eraser is the latest Norton Recovery tool. It is being released at the same time as Norton Internet Security and Norton Antivirus 2011. The tool is aimed at detection and clean-up of “0-day” threats (0-day threats are those that take advantage of a newly discovered hole in a program or operating system before the developers have made a fix available – or before they are even aware that a hole exists.) There is special focus on ”Fake AV” (aka ”Rogueware” or ”Crimeware”). Fake AV is a rogue piece of software that pretends to be security software and tempts the ...
Read More
Kudos1 Stats

Testing and Accountability

AMTSO (the Anti-Malware Testing Standards Organization) is a coalition of security professionals, including many antivirus product vendors, product testing organizations and publishers, and some interested individuals. Given the highly technical nature of its activities, it is inevitable that the organization owes some of its authority to the expertise of the security specialists within its ranks, but that doesn’t make it a vendor lobby group. As Kurt Wismer (not himself a member) points out here (http://anti-virus-rants.blogspot.com/2010/06/nss-labs-vs-amtso.html) “many of them are employ...
Read More
Kudos1 Stats

The Performance Strategy Behind Norton 2011

A few years ago we threw down the gauntlet, challenging the idea that performance must be traded away in favor of security. To accomplish our mission, we changed ourselves and in the process, changed the entire conversation, shifting the focus to include not only effectiveness and accuracy but minimum performance impact felt by the customer. But we’re an industry leader, so rehashing the previous cutting-edge methods won’t do. In 2011, we’ve picked up our own challenge and turned in a new direction, pushing ourselves to go even farther for the betterment of our customers. In order to do...
Read More
Kudos1 Stats

Got an Idea? Tell us!

Got an Idea? Tell us! Have you ever used a product and thought “if only it had this feature…” or “if I could just do that easier” wishing you could spend a few minutes with the developers to hear you out?  Well, today we’re excited to introduce a new section of the Norton Community called Norton Ideas which will allow you to do just that.  Norton Ideas is a site that will allow you to submit your product feature suggestions directly to the Norton product development team.  The Norton product team is here to listen to your suggestions, discuss them amongst the community and put the best id...
Read More
Kudos1 Stats

Apple Announces the iPad

As I write this--about 15 minutes before Apple's "Newest Creation" event is set to begin--I feel, if the hype is to be believed, that I am writing this on a piece of papyrus, musing on the concept of the printing press.  I think it is fair to say that this morning's presentation is the most anticipated technology announcment in Apple's history, if not of all time…and we are not even sure if Apple's actually going to announce it! "It," of course, refers to Apple's entry into the tablet market, the next wave of computing, which does away with the standard keyboard/mouse/screen computer and ...
Read More
Kudos1 Stats

Norton Utilities Premier – New!

Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data.  Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk.  What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.  I’m excited to announce the newest Norton weapon in the fight against PC slugg...
Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos1 Stats

Cloud AntiVirus Forecast: Foggy, with a Chance of Irrelevance

We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic. On the heels of RSA, a new “cloud antivirus” (AV) solution has been introduced which ha...
Read More
Kudos1 Stats

Norton Account

One of the exciting features of Norton products is their ability to be managed using Norton Account.  Norton Account is great because it enables you to have complete control of all of your Norton Product Subscriptions and Keys in one convenient place.  From Norton AntiVirus to Norton 360, you can update, view and edit all of their information.  I know a lot of users find Norton Account great because it enables you to easily retrieve your product key for re-installation of your Norton product.   Norton Account allows you to log in from any computer in the world and instantly see the Norton ...
Read More
Kudos1 Stats

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More