While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful t...
Norton users* can breathe more easily knowing that they are backed by Norton by Symantec’s gold standard of security in light of a security advisory about a new zero-day bug affecting Microsoft Internet Explorer. Other vendors are using the name “Operation Clandestine Fox” to identify targeted attacks using this bug in the wild. Users of all versions of Internet Explorer are vulnerable, but, so far, this bug is not being used in widespread attacks.
Microsoft will be issuing a patch for supported operating systems, but Windows XP users will need to find another way to stay secure, as ...
To our Norton Customers:
Symantec is pleased to announce the official release of our Norton 2009 products. This year, we’ve made performance improvement the key focus of the 2009 Norton product line. Virtually everyone in the company - including executive management, product engineering, Quality Assurance, design, and development - knew that this was our main mission ever since our first 2009 engineering planning sessions. Since then, we’ve questioned, agreed, and disagreed to many of the ideas and concepts that came up, but we were consistently guided by our shared vision and dedicatio...
While building the first release of Norton 360 in 2006, we decided we didn't want to use the typical task scheduler so many other products use to run weekly antivirus scans. Remembering to keep your computer on "every Wednesday night at 2am" is a pain, so we set out to build a better wheel.
Norton 360 introduced Symantec's smart task scheduler. The new scheduler doesn't rely on a fixed schedule - instead it works around yours. Basically, Norton 360 is always looking for times that you're away from your desk and uses those opportunities to perform the routine maintenance tasks it needs to k...
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees.
This was my first time attending this conference, and although I did my research on it, it was beyond my e...
One of the exciting features of Norton products is their ability to be managed using Norton Account. Norton Account is great because it enables you to have complete control of all of your Norton Product Subscriptions and Keys in one convenient place. From Norton AntiVirus to Norton 360, you can update, view and edit all of their information. I know a lot of users find Norton Account great because it enables you to easily retrieve your product key for re-installation of your Norton product.
Norton Account allows you to log in from any computer in the world and instantly see the Norton ...
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared device, such as a tablet or smartphone, or just to keep prying eyes away from the device.
In our busy lives, sometimes we don't give much thought when a close friend asks to look at something on our phone, or your rambunctious child snatches up your tablet to get their Angry Birds fix. But the things we have on our devices contain much more information about ourselves than we realize. Norton App Lo...
Norton Browser Protection
One of the lesser known capabilities in our Norton protection products is a feature that protects you from attack when you surf the web. We call this feature Norton Browser Protection and I thought I’d spend a few minutes sharing with you what it does and why we believe it has become a critical part of protecting you from attack as you surf the web.
What’s the problem that Browser Protection addresses?
Well think about how much time you spend surfing the web every day. I bet it’s a lot more that it was five years ago. As more and more of our activities ...
Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...
We’re excited to share with you that we have reached another major milestone with Norton DNS. As mentioned in a recent press release update on our Norton Everywhere initiative, we’ve just opened BETA testing of our new Web Content Filtering service within Norton DNS!
This new functionality means that we have extended Norton DNS protection beyond malicious and phishing sites to provide content filtering capability for over 55 million sites, in more than 23 different languages. Users of this new Norton DNS 1.5 beta with Web Content Filtering (BETA) service will be able to create their ow...
The Internet, social media and mobile technology make it harder than ever to keep your kids safe. Norton Family Premier, recent recipient of the PC Magazine Editor’s Choice Award is an invaluable tool to help you help your kids. Lead Security Analyst at PC Magazine, Neil Rubenking, cited the “impressive range of parental control and monitoring features for parents of today’s hyper-connected kids.”
We are excited to announce the Beta launch of Norton Identity Safe Standalone. Norton Identity Safe takes away the pain of having to remember multiple passwords and securely stores important information such as credit cards numbers, addresses, and phone numbers. Please visit https://identitysafe-beta.norton.com/ to try the Beta.
Passwords have become a way of life for every computer user. They are one of the most popular methods of user authentication on the Internet. They are used to check emails, access bank accounts, watch movies, play games, and a lot more.
The world would be...
Hello, my name is Kunal Karandikar and I am a Manager on Symantec’s Consumer Products Engineering team. My colleagues and I are excited about Norton Insight, a brand new feature to the 2009 Norton product line. There have been a lot of questions about how it works and what it does. In fact, there have been a few articles published recently that have compared Norton Insight with other technologies which we think are actually somewhat different, and believe do not really match up well to our new feature. We will hopefully be able to clear up some of the confusion and misconceptions within th...
Norton Internet Security 2010 BetaWelcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta!
We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system.
To access the Public Beta build, simply navigate to Norton Beta Center and select Norton Internet Security 2010 or Norton AntiVirus 2010.
After you complete registrat...
New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security
Mountain View, Calif. – Jan. 3, 2017 – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for pre-orders today and will change the way people secure their connected homes.
Today’s home networks, b...
One of the great new features we’re adding to the Norton 2012 product line is the ability to manage your installed Norton products from one central website. Have you ever received a call from your remote family member that their Norton product is out of date or their Norton subscription needs a renewal? Before the management feature, you’d have to physically be present to address these issues. Now, once you have installed Norton Management on a device, you can handle these things (and more) from the Management website! The site gives an overview of all your managed machines and you can...
Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape.
As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
I haven't made a post on here in a while,
and there's a good reason. I've been keeping my head down, working hard
with my teammates on Norton Online
Family. Now that the beta has been released you can see the fruits of
our labor for yourselves.
I am really excited about this
product. I'm not a parent yet, but my wife is expecting our first child
at the end of July so I have spent a lot of time over the last year or so
thinking about what type of father I aspire to be as well as thinking broadly
about the unique problems related to keeping your family safe online. I'm
Every day, corporations, governments, and individuals must live with security vs. performance tradeoffs. An extra layer of security in any situation, digital or otherwise, always has a performance impact. A simple (and probably overused) example is airport security. Standing in an airport security line is time consuming, but provides the level of security mandated by the government. We are mandated to trade performance (walking straight to the terminal) for the security provided by the inspections. Overzealous security can cause bottlenecks, which inhibits daily activities. Eliminat...
We’re excited to tell you about the new and improved version of Norton Safe Search, now available as part of the Norton Internet Security 2010 public beta. Norton Safe Search takes the site ratings provided by Norton Safe Web a step further by delivering a fully customized search results page with built-in security features such as filtering out unsafe sites, an interstitial warning page, Privacy Safeguard, and other options such as allowing users to display only safe shopping sites.
Norton Safe Search is completely optional and provides users more control over their search experience. ...
Today, the Norton team is launching an exciting new beta offering called Norton Safe Web, a Web site rating service that makes it easy for users to differentiate safe sites from malicious ones. Once downloaded, the beta will provide visual site ratings within everyday search results from top search sites like Google, Yahoo! and Live Search- so you can keep using your preferred search tool and don't have to take any extra steps. Additionally, due to the nature of Web threats such as drive-by-downloads, it will also warn users before they visit a site that contains malicious content.
(view in My Videos)Sometimes you need a bodyguard, sometimes you need an advisor
Most often, users are concerned about dangerous, active threats against their computer.
If malware is detected on the PC, users generally prefer that it is simply and quietly blocked. Similarly, when users are online, they expect to be protected from pages that contain malicious content or that are part of phishing scams.
Phishing sites are an obvious, immediate and direct threat on a user’s most valuable information. This is a simple security decision. A webpage is either the correct webpage or it’s an imp...
Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data. Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk. What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.
I’m excited to announce the newest Norton weapon in the fight against PC slugg...
At the heart of every Norton improvement is you, real people in real-world situations. Take a look at how our commitment to your security has evolved Norton.
Norton is the leader in digital solutions and we have the best in class digital security solutions available on the market today that’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise. Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you with support whenever you need it most.
We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-ups...
Everyone here at Norton is extremely excited about this new release of the Norton security products! This is the first time we are launching all three products at once: Norton AntiVirus, Norton Internet Security, and Norton 360. In this two-part blog post, I plan on going through some of the new features and improvements we have made. The first part will cover some of the things we’ve done on the protection side, while the second part will cover the performance and experience side of things. Hopefully this will explain how some of these technologies will make your computing life safer and ...
I was just reading a story about Microsoft’s new subscription software package – Microsoft Equipt – and I have to say I was baffled to see the new “post-Bill Gates” Microsoft continuing to push these tired, old bundles. Drawing consumers in with the promise of enhanced productivity but essentially delivering a hodge podge of Microsoft technologies that lack consumer value and limit choice, Equipt looks less about providing a compelling value proposition and more about increasing Office revenue.
In the old days, practicing “safe Internet” meant staying in the good online neighborhoods so you didn’t get infected. Today, almost any website you visit could be a landmine leading you to having your system compromised. We all remember the quote from Austin Powers where Dr. Evil says “One MILLION dollars”. Now imagine a techie version of Dr. Evil, let’s call him “Dr. Drive-by” saying in that same tone “One MILLION websites compromised”. Drive-by download outbreaks can be measured in how many occurrences a particular domain name occurs in Google searches. Recent reports from SANS Interne...
Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online.
Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online.
While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of peop...
This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers.
What are the risks?
As with anything you post online, it’s out there for everyone to see, so you will want to be careful with what identifiable information you u...
A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.
On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne hardly seems a likely candidate for cyberbullying.
The former Parramatta Eels, San Francisco 49ers and Fiji rugby sevens superstar holds an elite place in Australian rugby league history, having been awarded the Dally M Medal twice as the NRL's player of the year. He has represented Australia and Fiji and in 2009 was also named the Rugby League International Federation’s International Pla...
WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans!
HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA
Date: Tuesday, November 11th, 2014
Time: Doors at 7:00 pm
Location: 777 Valencia St, San Francisco, CA 94110
U.S. only giveaway
Must be 21+ years old
Concert held at The Chapel in San Francisco, ...
WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans!
HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY
Date: Thursday December 11th, 2014
Time: Doors at 7:00 pm
Location: Marlin Room @ Webster Hall
U.S. only giveaway
Must be 21+ years old
Concert held at Marlin Room @ Webster Hall 12/11/201...
With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.
Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get paid to complete surveys, and earn rewards or special discounts from popular brands. Some surveys aren’t paid at all, offering consumers little more than the opportunity to participate in the development process of a product or service.
There’s been a lot of hype about people allegedly making a living off of these online surveys, causing...
According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts.
Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on.
For a long time Mac users enjoyed a period of peace—they felt impervious to threats, only to realize years later that the sophisticated hacker would eventually evolve to this platform...
A new wave of phishing attacks on Facebook users is
underway. You'll remember the story from several months back of someone
whose login credentials were stolen and then the crook used that Facebook
access to swindle the victim's friends out of thousands of dollars. The current
effort resembles that one, in that a compromised account sends a malicious
link to friends. The friends click on the link and are taken to a site that
looks just like a Facebook login page. Providing the criminals with their login
and password can sometimes injure the victim beyond the damage to their social
Jaqcqui Cheng from Ars Technica has a great article today about the latest email scam design to trick people into giving up their personal information (including social security number and mother's maiden name), this time, the email is supposedly from the iTunes store and links to a poorly crafted site. You should check out Robert Vamosi's article on Cnet about this as well.
Okay, so this is really nothing new, we talk about phishing scams all the time. However, like Jacqui writes in her article, this is interesting because Apple users are getting targeted. iTunes is cross platform, lot...
As consumers around the country get ready for another holiday shopping season, hackers are likely gearing up with Point-of-Sale (POS) malware kits. Over the past year many US retailers—big and small—fell victim to mega-breaches that compromised approximately 100 million payment cards, potentially affecting about one-third of US consumers. Some retailers have taken measures to secure their POS terminals, but until a complete transition to more secure payment technologies is made, many retailers are still vulnerable to POS attacks. Therefore, it is up to consumers t...
In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my passion for cyber security. Admittedly, I became addicted immediately, which lead me to research how the game works, how to play it, and what the possible security risks are that come along with the game.
Firstly, it is important to note that this game is not your average smartphone game. It uses a technology known as augmented reality, which is a blend of real life and technology. There are m...
One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play along with your children!
First things first, with all apps your children are interested in, download the app and play it yourself to become familiar with what your children will be doing. This way, you can become more informed about the gameplay, and you can talk to your child about how to be safe while using it.
This is part two of a three part series where we are going to delve into examini...
The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game for getting their children off of the couch and out getting some actual exercise. So far, my favorite headline about the game has been “Sore Legs Become Pandemic As Pokémon Go Players Accidentally Get Exercise.”
However, I’ve also stumbled upon some other news headlines that are quite worrisome, that affect people’s virtual and physical privacy. As a result, instead of writing a typical artic...
When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime wasn’t quite the household name it is today, therefore, there was a wide unfamiliarity of it within the public eye.
Directors and writers have struggled with how to portray hacking in film simply because the act of hacking in real life is not very interesting or visually compelling. It’s just lines of code scrolling down a computer screen. In order to keep the viewer entertained they used chee...
In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream me...
Social media is a hugely important tool for growing your business’s brand, and the last thing you want to do is expose your customers to spam. Yet we’ve all seen it: the tweet promising thousands of new followers or the Facebook post teasing a way to lose weight or earn easy money – of course only if you’ll click on a link. It’s an issue that’s not going away any time soon, and it must be handled in the right way.
The last thing we want to do is make our social media pages less open to the public, so instead we must use the settings available to us to keep spam away, and actively deal wit...
It has always been in the interest of malware authors to hide their malware on an infected machine. They don’t want to make it easy for security vendors to find and remove their files. Rootkits are one of the most sophisticated methods malware authors use to stay undiscovered.
A rootkit is a tool that allows an attacker to hide a threat on a computer. Rootkits almost never work alone. Instead, an attacker will deliver both a malicious program (e.g., spyware) and an accompanying rootkit when they infect a new computer. The job of the rootkit is to hide telltale signs of both itself and...
Are you ready to tech the halls? Mobile tech like smartphones and tablets top many gift lists and wishlists this year. In fact, 74% of U.S. holiday shoppers intend to give consumer electronics as presents (source: CEA).
However while you're anticipating santa's gifts by your chimney, the holidays provide scammers with an opportune time to sweep up valuable personal data as well as lost or stolen devices. That's why Norton has captured these security tips to protect your presents.
Don't fa-la-la-la-fall for cybercriminals' tricks. Take these first steps to protect your privacy and secur...