• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

Introducing The Norton Cyber Hero Video Series Volume One: Zach Latta

Meet Zach Latta, a 17-year-old student who started HackEDU to bring coding to high schools across the country.

Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos0

Is connected car data the next privacy concern?

GPS devices have made driving so much simpler in recent years, and it’s hard to find a driver today who does not use one for long journeys. But what are the downsides to being constantly connected when driving? While you’re getting vital information to help you reach your destination, what vital information of yours is flowing the other way? One big car maker was recently forced to deny that it collects and shares personal data on drivers and their habits through their GPS devices, but we’ve seen time and time again that all that gatherable information can prove too tempting for a company...
Read More
Kudos0

Is It Doing Anything?

I recently explained how the Smart Scheduler feature in Norton 360 works to stay out of your way in deciding when to run tasks. The scheduler is so effective that it's common for users to wonder if we're ever performing scans. Neil Rubenking even noted in his PC Magazine review of Norton 360 that "It's so quiet you might begin to wonder if it's doing anything at all." We want to shed some light on this for anyone (myself included) who can't resist the urge to dig into how things work. We've created a small widget that shows you everything going on behind the scenes: You can download it he...
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud? My answer? Absolutely not. Zone is only one cloud service, among many, that Syman...
Read More
Kudos4 Stats

Is Paying For Antivirus Software Worth It?

Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. The price of digital safety It’s hard to put a price tag on digital safety. Take malware for example. These sneaky little codes find their way into your devices and transmit your personal information to computers far away that are operated by fraudsters. The end result could translate into anything from cybercriminals draining your bank account to holding all your information hostage by freezing your device and asking ...
Read More
Kudos2 Stats

Is Personal Data Really Gone When It’s Deleted from a Device?

Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a computer’s hard drive. But what really happens to all that data? Where does it go, and is it really gone forever? Some people will be relieved to know that, most of the time, deleted files are not permanently gone. Many of us have at one time or another accidently deleted items we did not mean to; in this case the prospect of bringing those files back from the dead is usually good news. The bad news...
Read More
Kudos2 Stats

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...
Read More
Kudos12 Stats

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves. With th...
Read More
Kudos4 Stats

Keep Everyone Protected When Handing Down Mobile Devices This Holiday Season

It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists. And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season. Protect your holiday hand-me-downs To many consumers handing down or selling their device may seem like a har...
Read More
Kudos3 Stats

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.   Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablet...
Read More
Kudos0

Keeping Your Business Safe From Attack

According to the 2014 Symantec Internet Security Threat Report, which examines the data from more than 41.5 million attack sensors and records thousands of events per second, spear phishing is not dead – it’s merely evolving. The technique uses fake emails to target a specific organisation in order to gain access to internal data, and although attackers used fewer emails on fewer targets last year, the total number of spear-fishing campaigns was up a startling 91%. More user awareness and better security means attackers are simply choosing their targets more carefully and sharpening their ...
Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Holiday Scams

Meet Kirby the IT Elf, and Santa's right hand technology man. As the Holidays quickly approach, so do a fresh crop of scams. In this episode, Kirby highlights the most popular scams this year, how to spot them and how to be safe.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Monitoring Your Financial Accounts

Norton has asked the North Pole’s #1 IT Elf to give you some tips for the Holidays. It might sound simple, but the best way to be safe during the Holidays is to monitor your accounts. Here Kirby gives some simple rules to keeping an eye on your accounts and what to do if you see some thing that shouldn’t be there. Kirby gives you simple steps to stay safe
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Old School vs Digital Wallets

Now that payments are regularly being made from phones and watches, Kirby gives you a run down of why digital wallets are becoming more popular, how they work and some issues to consider.
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags. 

Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.     Follow these secure Wi-Fi ha...
Read More
Kudos4 Stats

LifeLock joins consumer business unit at Symantec

We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise subsidiary ID Analytics, is underway. There is a lot of passion and excitement from our combined team around the promise and potential we have together to provide a comprehensive digital safety platform that gives you, our customers, a greater sense of security with the addition of identity theft protection expertise. With this acquisition, Symantec is redefining what safety means in a connected w...
Read More
Kudos0

Live from WWDC 2009

Symantec's Mac product manager, Mike Romo is attending the Apple WW Developer Conference in San Francisco this week and shares some thoughts from this morning's keynote address in this video...Message Edited by Sondra_Magness on 06-08-2009 05:41 PM
Read More
Kudos4 Stats

Love, lies and online dating

It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the probability of finding a suitable companion. As in finding love the traditional way, online dating too also has its pros and cons. A recent survey by Norton among men and women in Australia and New Zealand revealed that almost a quarter of the people who have tried online dating and no longer have a profile have found their partner online. The survey* conducted among New Zealanders and Austra...
Read More
Kudos2 Stats

Lunar New Year Online Security Tips

It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online. Norton wishes you an exciting (and secure!) year ahead!
Read More
Kudos0

Lunar New Year Security Checklist

Because you should be spending your time enjoying the festivities, here are a few security tips for Lunar New Year. Wishing you a fun, safe celebration and year ahead from Norton! Will you capture irreplaceable memories this Lunar New Year? Try Norton Zone for free, a safer and easier way to share files with family and friends.
Read More
Kudos0

Macworld 2009

As Alec Baldwin remarked in State and Main, "Well, that happened." Pretty much sums up this year's MacWorld Expo, which ended this week in San Francisco.  As I have done for several years (my first ad was in 1985), I made the annual pilgrimage to Moscone Center to meet up with my fellow Mac-heads, eager to see what was happening with Apple and other software and hardware makers and just enjoy what the world might be like if everyone used a Mac, if only for a few days.MacWorld's an interesting phenomenon. In the early days of the Macintosh (as we called it back then), it truly was the best ...
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click. While it is unfortunate that scammers would look to capitalize on this tragic incident, this is a common t...
Read More
Kudos4 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Read More
Kudos3 Stats

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information. Exploit Kit Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through tha...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Read More
Kudos0

Malware can come from anywhere…

Earlier today I came across a CNET blog entry wherein Ina Fried discusses the recent purchase of a refurbished iPod that arrived with a virus on it.  Although Ina's article is about an iPod, it reinforces the reality of today's threat landscape: malware can come from anywhere. As we look at the Genesis of Computer Viruses (see The Art of Computer Virus Research and Defense, by Peter Szor), we can't help but remember the days when the vast majority of personal computer malware spread via physical interaction between computers, usually in the form of floppy disks.  These early viruses operat...
Read More
Kudos2 Stats

May The Fourth Be With You

Did you know that there was more than one Death Star? What’s more, the destruction of each one of them was via one vulnerability, or weakness in the whole system. To celebrate May the Fourth we’re taking a look at vulnerabilities that nearly ended the Empire. Whichever side you choose, don’t become a victim to software vulnerabilities. As the story goes: A long time ago, in a galaxy far, far away… The Death Star I was designed to be an impenetrable fortress and a symbol of the Emperor’s hold on the galaxy. In case you’re not familiar with it, the Death Star is a fully contained; moon s...
Read More
Kudos2 Stats

Microsoft Internet Explorer Unpatched Vulnerability is Here… Norton Users Never Fear!

Normal 0 false false false EN-US X-NONE MicrosoftInternetExplorer4 ...
Read More
Kudos0

Microsoft Security Essentials: “Reruns” Aren’t Just for TV Anymore

If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.” Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Read More
Kudos1 Stats

Middle School Kit: A Broader World of Cybersecurity Protection

A guide for parents and children. It can be a full-time job for any parent to be constantly aware of everything that their children are doing online. Kids these days may seem pretty sharp with technology and the Internet, however, we forget that they’re still learning (and so are we) and may not always be prepared to spot the risks and pitfalls of being constantly connected. In this two-part article, we’ve put together some tips for you as a parent to ensure that your children are safe on the Internet, and some basic cyber security tips that you can share with your children. The best wa...
Read More
Kudos0

Mobile Fitness Trackers May Be One Step Away From Hacks

Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.    It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of ou...
Read More
Kudos1 Stats

Mobile Scams: How-to Identify Them and Protect Yourself

With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.

Read More
Kudos1 Stats

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to b...
Read More
Kudos0

Mobile Security Advice For The New Term

Technology and education now go together more closely than ever, with laptops and tablets now regular sights in classrooms. The range of educational apps in both the iOS App Store and the Google Play Store is huge and growing all the time, and the cloud has made it possible to learn across multiple devices with ease.   And yet, with such progress inevitably comes a downside. With all that extra work being created and stored on our phones and tablets, we have to think carefully about security issues. While your science project might not be the prize a hacker is after, losing it means more t...
Read More
Kudos0

Mobile Security Resolutions for the New Year

  Welcome to the new year! Now that the holidays are a wrap if you're like many, you may have received the gift of mobile this year. In fact, 74% of U.S. consumers intended to give consumer electronics as presents (CEA). But while new mobile trends are in fashion for 2014, mobile cybercrime threats are trending also. More than 1/3 of smartphone users have experienced mobile cybercrime (2013 Norton Report). That means, resolution number one on your list should be to security protect your shiny, new mobile devices and tablets.     Mobile Malware: How-to Protect Your Smartphone and Tablet ...
Read More
Kudos1 Stats

Mobile Security Smarts: How Hack-Proof are Your Mobile Habits?

With holiday gift-giving going mobile, are you eyeing a new device? More than half of holiday shoppers plan to purchase a tech accessory this season, with TVs, tablets, and smartphones topping many wishlists. While two-thirds of those shoppers plan to use a mobile device to help them make holiday purchases (according to ce.org). Do you have the right habits to keep a shiny new device secure? Put your mobile habits to the security test. Top takeaways for smarter mobile security. Be cautious of connecting to public wi-fi and mobile hotspots while you’re on the go. These networks are n...
Read More
Kudos2 Stats

My Account May Have Been Hacked—What To Do Now?

You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox. Regardless of where the leak originated, this is something we see all too often in the tech and busine...
Read More
Kudos4 Stats

Myth-Busting Windows 8 Security: Part Four

In this four-part blog series, I have briefly reviewed some of the myths we’ve heard about Windows 8 security improvements and point out where deficiencies lie. We believe security should still very much be a concern for anyone running the new Windows 8 OS. Visit this earlier post to learn more about the series. In today's post, I'll address Myth #4: SmartScreen will keep users out of trouble. First introduced as a security add-on feature for Internet Explorer v8.0, the SmartScreen Filter (SSF) checks the sites a user visits and the files they download and compares them against lists of ...
Read More
Kudos4 Stats

Myth-Busting Windows 8 Security: Part One

Leading up to Microsoft’s launch of the new Windows 8 operating system, there has been a lot of media chatter about what the new operating system means for security. Specifically, folks want to know whether users will be more secure on this new platform. Let’s examine more closely a few of the claims we’re hearing. In response to an increasingly sophisticated threat landscape, Windows 8, like its predecessors (Windows 7, Vista, XP, and on) raises the bar in terms of new defenses to help defend against increasingly more cunning and devious malware variants. But does this mean that systems ...
Read More
Kudos2 Stats

Myth-Busting Windows 8 Security: Part Three

In this four-part blog series, I briefly review some of the myths we’ve heard about Windows 8 security improvements and point out where deficiencies lie. We believe security should still very much be a concern for anyone running the new Windows 8 OS. Visit this earlier post to learn more about the series. Myth #3: Changes to the Windows 8 boot sequence make it secure. In previous releases of Windows, the boot sequence has been an area ripe for sophisticated attacks against the operating system.  During the early phases of loading the Windows OS, there were a number of holes that could b...
Read More
Kudos2 Stats

Myth-Busting Windows 8 Security: Part Two

In part two of this four-part blog series, I'll continue to review some of the myths we’ve heard about Windows 8 security improvements and point out where deficiencies lie. We believe security should still very much be a concern for anyone running the new Windows 8 OS. Visit this earlier post to learn more about the series. Myth #2: Windows 8 is safer because all apps are sandboxed from the rest of the system. As you likely know if you’ve been following the news around Windows 8, it will introduce a new style of application called the Windows Store app.  These apps leverage a new set of...
Read More
Kudos1 Stats

National Clean Out Your Computer day-The Importance of Clean Computing

February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.”  For centuries, this saying applied to tasks like scrubbing the floors and dusting the bookcases. Today, however, it applies to your computer just as much as it does to your house. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs. Why Clean? Cleaning both your computer’s hardware and its software matters.  Clean hardware help...
Read More
Kudos1 Stats

Netiquette For Parents

No one said parenting is easy. Especially when your children are doing things in the cyber world that you as a child never imagined. With the wealth of information and non-traditional methods of making friends and hanging out, our children are no doubt having a good time, thanks to the advancements in technology. But that still doesn’t mean they have the liberty to do as they please at the expense of others. One of the most important aspects of parenting is setting a good example. Your kids will closely watch your online manners and etiquette. You need to be aware and educated about net...
Read More
Kudos1 Stats

New Feature for Norton Internet Security 2010 - Download Insight

Why Download Insight?Downloading malicious software, typically when tricked into doing so, is becoming the primary way malware infects people’s computers. Nearly every threat today is unique in some way and is designed to evade detection putting tremendous pressure on the traditional signature-based approach. By the time a signature is written for a particular malware variant,  it has already changed itself and as far as the signature is concerned it is an “unknown” file. Whether the signatures are on the disk or in the cloud, they are usually not fast enough to keep pace with modern threa...
Read More
Kudos0

New Norton - Compatibility with new features of Windows 8.1, advanced protection, simplified setup

By Gerry Egan, senior director, product management, Symantec Corp.   Today, we are excited to announce the release of the latest versions of our award-winning Norton core security products, which keep consumers safe from evolving threats in their daily online lives. The latest versions improve on the industry’s leading protection and performance, and are designed for compatibility with the new features of Windows 8.1. According to Symantec research, Web attacks increased 30 percent in 2012, driven by the easy availability of malware toolkits and the high frequency of unpatched vulnerabi...
Read More
Kudos0

New Trojan Attacks Pirates

  We all know that software piracy is bad--it hurts the people who write software for a living--but it can also be dangerous. Case in point: the recent OSX.Iservice Trojan horse discovered today (January 22nd). Apparently, someone has uploaded Apple’s popular iWork 09 suite and added a Trojan horse to the installer.Some background: When software developers create an installer for the Mac, it's often several mini-installers, or packages, that are run in a particular sequence. Each package (.pkg file) contains specific code and a script makes sure that the code is placed in the right part of...
Read More
Kudos1 Stats

New Year, Renewed Readiness

With a new year comes renewed excitement, refreshed minds and revitalized focus for all that lies ahead. The same is unfortunately true for the cybercriminals we are up against.

Read More