• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that 90 percent of Android devices are exposed to at least one critical vulnerability.  The threat model was constructed using three common attack vectors: installation attack (malicious codes installed through app download); dynamic code loading (an existing app downloads new malicious codes); and injection (an attacker injects malicious code...
Read More
Kudos1 Stats

Computer held hostage? Try Norton Power Eraser

Bridging the Gap Norton Power Eraser is the latest Norton Recovery tool. It is being released at the same time as Norton Internet Security and Norton Antivirus 2011. The tool is aimed at detection and clean-up of “0-day” threats (0-day threats are those that take advantage of a newly discovered hole in a program or operating system before the developers have made a fix available – or before they are even aware that a hole exists.) There is special focus on ”Fake AV” (aka ”Rogueware” or ”Crimeware”). Fake AV is a rogue piece of software that pretends to be security software and tempts the ...
Read More
Kudos2 Stats

Lunar New Year Online Security Tips

It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online. Norton wishes you an exciting (and secure!) year ahead!
Read More
Kudos0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online.

Read More
Kudos1 Stats

The Basic Steps to Online Safety and Security- NCSAM Week 1

Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age, that is not the case. The threat landscape has evolved just as our technology has. The more devices that are out there equal more things for cybercriminals to attack. Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as installing antivirus on a computer anymore. A good foundation to personal cybersecurity is knowledge. Since threats don’t come solely in digital f...
Read More
Kudos2 Stats

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 websites through botnets (computers that have been infected with and controlled by a computer virus). The sites ranged from small sites to larger household names. Many of the targeted sites are still vulnerable. 2014: The Year Of The Mega, MEGA Breach? In Symantec’s 2014 Internet Security Threat Report, researchers declared 2013 as “The Ye...
Read More
Kudos0

Building the Next Generation of Cyber Professionals

As more of what we do online grows, so does the need for cyber security professionals. Now that everything is connected, criminals are shifting their focus to the Internet landscape, utilizing social engineering and other types of scams to obtain financial and personal data from unsuspecting victims.

Read More
Kudos1 Stats

How Do Firewalls Prevent Computer Viruses?

You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber criminals. But that doesn’t mean you know how a firewall actually works, does it? Don’t worry—the truth is that most people don’t how a firewall works; they just expect it to do its job. But it’s actually a lot simpler than you might think. Once you learn a little more about firewalls, you might feel more confident about installing one on your home computer, if you haven’t already. If you’re already using a firewall to prevent cyber attacks, perhaps learning more about how it works will improve ...
Read More
Kudos2 Stats

May The Fourth Be With You

Did you know that there was more than one Death Star? What’s more, the destruction of each one of them was via one vulnerability, or weakness in the whole system. To celebrate May the Fourth we’re taking a look at vulnerabilities that nearly ended the Empire. Whichever side you choose, don’t become a victim to software vulnerabilities. As the story goes: A long time ago, in a galaxy far, far away… The Death Star I was designed to be an impenetrable fortress and a symbol of the Emperor’s hold on the galaxy. In case you’re not familiar with it, the Death Star is a fully contained; moon s...
Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos3 Stats

DOS Attacks Explained

A “denial of service” or DOS attack is used to tie up a website’s resources so that users who need to access the site cannot do so. Many major companies, have been the focus of DOS attacks in recent years. Because a DOS attack can be easily engineered from nearly any location, finding those responsible can be next to impossible.

Read More
Kudos2 Stats

The Future of the Connected Home: Security in the Internet of Things

4.9 billion connected things are expected to be in use in 2015, increasing to 25 billion by 2020. Many of these smart devices can be found in the connected home. Symantec researchers have found that smart home devices have basic security issues, such as weak authentication and common web vulnerabilities. These can be exploited by hackers posing a privacy and security risk. Safeguards against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks and actionable tips to stay safe in the internet of things...
Read More
Kudos0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them. Meet the Cookie A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Read More
Kudos2 Stats

How to Use Your New PC or Mobile Device Safely Online

There are more mobile devices on our planet than there are people. It is no surprise that our daily and digital lives have become a seamless unit of existence. Just like your real life, your digital life comes with its own ups and downs. The upside of your digital life is that you can start fresh with a new device and clean up any old hang-ups that can compromise you. We, at Norton know everything there is to know about the safety of your digital life. We are determined to stay one step ahead of cyber criminals and keep our customers safe. If you have a new device or PC do not miss our g...
Read More
Kudos1 Stats

How To Recognize and Protect Yourself from Cybercrime

Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more concerns than just basic financial ones. When you see the full list of cybercrimes out there, you might be tempted to stop using the Internet entirely. However, such drastic measures are not necessary. All you need to do to protect yourself is take some basic precautions and know who to contact when you see others engaged in criminal activities online. ​What Is Cybercrime? Cybercrime is any ...
Read More
Kudos2 Stats

Online Christmas Shopping: Naughty or Nice?

Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online. Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online. While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of peop...
Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.. But have you ever thought that way about what is on your tablets, computers and mobile phones? Right now, most folks have hundreds of phot...
Read More
Kudos2 Stats

Cybercrime Survival Toolkit- Surviving The Most Dangerous Town On The Internet

As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more. ...
Read More
Kudos2 Stats

Technology Usage and the Physical Effects on Your Body

Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body, including a condition known as “text neck.” Extra strain on the muscles from sitting and reading various devices for long periods of time makes tissue sore and inflamed, and can potentially pull your spine out of alignment. Health experts call this damaging posture “forward head posture.” “Neck muscles, in their proper position, are designed to support the weight of your head, about 10 to ...
Read More
Kudos1 Stats

What is a Botnet?

The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions. A botnet is nothing more than a string of connected computers coordinated together to perform a task. That can be maintaining a chatroom, or it can be taking control of your computer. Botnets are just one of the many perils out there on the Internet. Here’s how they work and how you can protect yourself. Botnets are the workhorses of the Int...
Read More
Kudos1 Stats

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.  With the advent of easy digital photography, however, connecting extra information to the photos became easy as well.  This information, known as “metadata,” might include items like the GPS coordinates of the photo’s location, the date and time it was taken, the camera type and shutter settings, and the software used to edit the photo. Many digital photographers don’t realize that their photos might carry this...
Read More
Kudos4 Stats

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.

Read More
Kudos3 Stats

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees. This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Read More
Kudos0

The Norton Pulse Updates Feature

The Norton Pulse Updates Feature   Summary It’s a simple truth: The faster virus definitions are received, the better the protection is for the computer. Norton 2009 has added a new technology, called Norton Pulse Updates, which downloads new virus definitions almost as soon as they are created, without sacrificing reliability or performance.   When new virus definitions are created, they are posted right away as small Pulse Updates. Every five minutes, Norton LiveUpdate downloads the latest Pulse Updates and they are incorporated into the customer’s PC virus protection immediately.   Puls...
Read More
Kudos0

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe. How Do Biometrics Work? If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
Read More
Kudos2 Stats

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.

Read More
Kudos0

Sneaky Spammer Tactics and How To Avoid Them

Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it’s up to users to identify signals early on and avoid unsolicited content. Here’s a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.  Spam on Social Media  A lot of the time, spam on social media is just bad social med...
Read More
Kudos2 Stats

Watch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That Took Down a Nuclear Power Plant

Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the years. However, brief news reports don’t even begin to uncover the darkness of this threat. In “Zero Days,” director Alex Gibney takes a deeper look at the sophisticated piece of weapons-grade malware that destroyed a part of an Iranian nuclear facility, as well as help facilitate espionage by spying on its target. This thrilling documentary discusses the complexity of the virus with Sy...
Read More
Kudos1 Stats

The smarter home: How to cut the cord with a smart TV

Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from cable service providers can be costly, and for many cutting the cord can also cut the bill. If you’re on the fence here are a few tips to get you started and most importantly home network security best practices to consider. Smart TVs are making headlines for faulty security and privacy risks. So when you cut the cord, stream smarter and more secure. Here’s how:  Step one: A smart TV Smar...
Read More
Kudos0

Mobile Fitness Trackers May Be One Step Away From Hacks

Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.    It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of ou...
Read More
Kudos1 Stats

The New Model of Consumer Protection: Reputation-based security technology

(view in My Videos) In just the past few years, the threat landscape has significantly changed – and traditional antivirus technologies can’t keep up. Attackers generate literally tens of thousands of new malware variants every day, often distributing each variant to just a handful of users. That means that each time a new victim visits an attacker’s web site, a slightly different piece of malware is served up. How can a security vendor ever hope to discover each of these thousands of variants?   We call this problem “server side polymorphism” and we’ve seen it grow over several years. Yo...
Read More
Kudos0

Watch Episode Two of "The Most Dangerous Town on the Internet- Where Cybercrime Goes to Hide" Now!

Today we are proud to announce the launch of the second installment in our documentary series "The Most Dangerous Town on the Internet."  In episode one, we visited the town Râmnicu Vâlcea, which is better known as "Hackerville." In the first film, we met hackers from all walks of life, including white, grey and black hat hackers, and talked to them about their motivations behind what they do. In the second installment, we travel all corners of the globe to find out where cybercrime goes to hide, by exploring what is called Bulletproof Hosting. While the hacker is the operator of the att...
Read More
Kudos1 Stats

Exploring the Deep Web

There are multiple “layers” to the Internet that you may not be aware of. The first, or top layer is called the surface web, and it is the part of the web that is crawled by search engines. That’s the part that you can see, it’s where Facebook, YouTube, Twitter and everything else under the search engine sun lives. The second layer of the Web is called the deep web. Think of it as an ocean- on the top you have the boats dragging their nets across the surface. The boats are the web crawlers for search engines, and the “nets” catch what is on the surface for indexing by the search engine. ...
Read More
Kudos0

Introducing Episode 2 of “In Search Of The Most Dangerous Town On The Internet - Where Cybercrime Goes to Hide"

Last year, the Norton team brought you a new look into cybercrime via the documentary “In Search Of The Most Dangerous Town On The Internet.” Through this film we investigated the Romanian town Râmnicu Vâlcea, also known as "Hackerville." While there, we spoke with various types of hackers and about their motives, and how they do what they do. In the second installment of our series, we explore the far corners of the globe, in search of bulletproof hosting, which is how cybercriminals execute their attacks. Watch the trailer today, and tune into Most...
Read More
Kudos7 Stats

What's The REAL Cost of 'Free'?

Consumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected. Advertising The acceptable way to monetise free software is to use advertising, and whether you’re okay with that will largely depend on how much you want that new app without paying for it. As the saying goes, “if you’re no...
Read More
Kudos0

BYOD vs. CYOD: What's The Best Fit For Your Business?

The last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature. But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every e...
Read More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy. What is ridesharing? Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button.  In a...
Read More
Kudos2 Stats

Thanksgiving - Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.

Read More
Kudos1 Stats

7 Ways to Ensure Your Data Is Safe During Vacation

It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a screeching halt in the event that your personally data is compromised while traveling. Vacations can often put your personal information at risk, due to careless missteps in how you go about preparing to leave, how you communicate while on vacation, and what you share on social media. Here are seven ways to ensure your data stays safe wh...
Read More
Kudos0

How to Freeze Your Credit Report and When

Freezing your credit report is sometimes very necessary. It prevents credit thieves from opening new cards and other accounts in your name, and is often recommended when you’re dealing with the ramifications of identity theft. What Is a Credit Freeze? A credit freeze, also known as a security freeze, gives you the chance to “lock” your data at major credit bureaus. Doing this also makes it impossible for identity thieves to use your name on anything linked to your credit report. You will receive a password or personal identification number to use for temporarily lifting or removing the f...
Read More
Kudos2 Stats

What Is Bulletproof Hosting?

You’ve heard of malware, ransomware, botnets, and the like. What you don’t hear about is the technology behind these threats. These threats all have to come from somewhere, they’re not just out there floating around on the internet- they have to be stored someplace. Since a majority of these threats are illegal in a lot of countries, this is where bulletproof hosting helps facilitate these threats. To clearly understand what bulletproof hosting is, we should first take a step back and talk about regular hosting. A regular web hosting service is a company that operates a facility, usually ...
Read More
Kudos19 Stats

What's New in Norton Internet Security 2012

We at Norton are very excited to share the Beta release for Norton Internet Security and Norton Antivirus 2012 products with you. Below are descriptions of the new features and great enhancements provided with this release. Protection 2012 introduces several new technologies to combat emerging threats. Fake AV is one of the most visible and wide-spread threats that Internet users face today. Fake AV pretends to be security software and tempts the user to pay for it. Even worse, it can install additional malware on the system and claim the system is clean. New for 2012, we’ve included...
Read More
Kudos3 Stats

Cyber Safety for Women

An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
Read More
Kudos1 Stats

Norton business announcement. Norton continues to Go Boldly

Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Holiday Scams

Meet Kirby the IT Elf, and Santa's right hand technology man. As the Holidays quickly approach, so do a fresh crop of scams. In this episode, Kirby highlights the most popular scams this year, how to spot them and how to be safe.

Read More
Kudos1 Stats

Norton Family Premier Receives PC Magazine Editor’s Choice Award

The Internet, social media and mobile technology make it harder than ever to keep your kids safe. Norton Family Premier, recent recipient of the PC Magazine Editor’s Choice Award is an invaluable tool to help you help your kids. Lead Security Analyst at PC Magazine, Neil Rubenking, cited the “impressive range of parental control and monitoring features for parents of today’s hyper-connected kids.”

Read More
Kudos4 Stats

What are the changes to the Norton Toolbar?

Now that the latest version of Norton Internet Security and Norton 360 are released, you may have noticed some improvements to the Norton Toolbar - the Share button and the Online Vault. Below is an explanation of the changes, and why we wanted them in the product. Why Online Vaults?   The Online Vault is Convenient. - It provides access to your most sensitive data from any iOS, Android, PC, or Mac device and from *any* device with a web browser. - It automatically synchronizes data across devices. The Online Vault is Secure. - Norton uses 256bit AES encryption to encrypt the data. Thi...
Read More
Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading. The Menace of Mobile Malware Mobile malware is the same kind of malware on computers, except it is engineered for your phones and tablets. Mobile malware is out to get you. Well, the details about you, anyway. As the popularity of smartphones and tablets grows,...
Read More
Kudos0

Norton App Lock: Protect Your Sensitive Apps

There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared device, such as a tablet or smartphone, or just to keep prying eyes away from the device. In our busy lives, sometimes we don't give much thought when a close friend asks to look at something on our phone, or your rambunctious child snatches up your tablet to get their Angry Birds fix. But the things we have on our devices contain much more information about ourselves than we realize. Norton App Lo...
Read More