• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

Norton SafeWeb - increasing online comfort and confidence

(view in My Videos)Sometimes you need a bodyguard, sometimes you need an advisor  Most often, users are concerned about dangerous, active threats against their computer. If malware is detected on the PC, users generally prefer that it is simply and quietly blocked. Similarly, when users are online, they expect to be protected from pages that contain malicious content or that are part of phishing scams. Phishing sites are an obvious, immediate and direct threat on a user’s most valuable information. This is a simple security decision. A webpage is either the correct webpage or it’s an imp...
Read More
Kudos1 Stats

Norton Utilities Premier – New!

Sad but true: that new computer isn’t going to last forever and, especially if you’re not careful, neither will all its precious data.  Over time, once-zippy computers can start to lag, getting bogged down with unnecessary programs, too many temporary files, broken registry keys and all sorts of other digital gunk.  What’s more, hard drive failure, theft and natural disasters can wipe out your precious files in an instant – music collections, treasured photos and financial documents that could be lost forever.  I’m excited to announce the newest Norton weapon in the fight against PC slugg...
Read More
Kudos0

Microsoft Security Essentials: “Reruns” Aren’t Just for TV Anymore

If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.” Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Read More
Kudos1 Stats

Norton Safe Search – New and Improved

We’re excited to tell you about the new and improved version of Norton Safe Search, now available as part of the Norton Internet Security 2010 public beta.  Norton Safe Search takes the site ratings provided by Norton Safe Web a step further by delivering a fully customized search results page with built-in security features such as filtering out unsafe sites, an interstitial warning page, Privacy Safeguard, and other options such as allowing users to display only safe shopping sites.  Norton Safe Search is completely optional and provides users more control over their search experience. ...
Read More
Kudos1 Stats

Yo Joe!

It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie , we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though. Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy. Throughout the week, pay attention! We’re going to be asking you some trivia questions about G.I. Joe and if you’re the first one to answer the question correctly, you might get one...
Read More
Kudos0

TwitViewer.net - Or How Something That Sounds Too Good to Be True Usually Is

The message might have come in early yesterday on your Twitter feed, "Want to know whos stalking you on twitter!?: http://twitviewer.net/" You might have clicked the link to visit the website. It all happened so fast, the fabulous offer (heck yeah, I want to know who the last 200 people are to look at my Twitter profile!) and the large scale distribution of the "tweet". Even seasoned journalists who should always wear their cynical and world-weary thinking caps fell for it. Yes, Virginia, it was a phishing scam that required people to cough up their Twitter username and password. It's true...
Read More
Kudos1 Stats

Intrusion Prevention System (IPS): Your first line of defense against malware

What is IPS? Intrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It is the first line of defense against malware. There is sometimes confusion between an IPS and a firewall. Personal firewalls are more basic, making allow/deny decisions to ensure that only “selected” programs are allowed to interact over the internet. Firewalls also block network communication on non-standard ports, which are generally not used by legitimate programs and services. On the other hand, an IPS goes one step further, and examines all network traff...
Read More
Kudos1 Stats

Cybercrime News: Conficker is Spamming, Weak Economy Drives Crime, Why We Click on Spam and More

There's evidence that the Conficker botnet (oh, did you really think they distributed those millions of bots without a plan to monetize them?) is now being used on a "for hire" basis. A story from the UK referencing a new report from Cisco, states that malware called Waledec is being distributed via Conficker's millions of infected computers. Waledec uses your system to send out spam and spread itself to other computers. Before you pull your hair out in frustration, just make sure you've got an up-to-date copy of Norton Internet Security or another comprehensive security product on your co...
Read More
Kudos1 Stats

SONAR 2

SONAR is a behavioral security engine that is at the heart of our antimalware defenses. With the unprecedented growth in malware that has been observed over the last few years, an effective security product has to able to distinguish a bad piece of new binary/software from a good one without the need for a fingerprint.  SONAR, first introduced a couple years ago into the Norton products, has been re-written for the 2010 products to keep pace with today’s threat landscape and take advantage of other new capabilities, such as our Quorum reputation services. Why do we need behavioral security...
Read More
Kudos2 Stats

Microsoft Internet Explorer Unpatched Vulnerability is Here… Norton Users Never Fear!

Microsoft Internet Explorer Unpatched Vulnerability is Here… Norton Users Never Fear! You might have heard a few things about a vulnerability in Microsoft Internet Explorer this week.  This is otherwise known as a “zero day” because it was found and hasn’t been patched by Microsoft at the time of discovery.  You can read more about the actual vulnerability here in the Microsoft Security Advisory for CVE-2008-0015.  This bug in Internet Explorer can lead to users having malware installed on your system silently just by visiting any Web site that might be hosting malicious code designe...
Read More
Kudos0

Live from WWDC 2009

Symantec's Mac product manager, Mike Romo is attending the Apple WW Developer Conference in San Francisco this week and shares some thoughts from this morning's keynote address in this video...Message Edited by Sondra_Magness on 06-08-2009 05:41 PM
Read More
Kudos1 Stats

New Feature for Norton Internet Security 2010 - Download Insight

Why Download Insight?Downloading malicious software, typically when tricked into doing so, is becoming the primary way malware infects people’s computers. Nearly every threat today is unique in some way and is designed to evade detection putting tremendous pressure on the traditional signature-based approach. By the time a signature is written for a particular malware variant,  it has already changed itself and as far as the signature is concerned it is an “unknown” file. Whether the signatures are on the disk or in the cloud, they are usually not fast enough to keep pace with modern threa...
Read More
Kudos0

Norton Internet Security 2010 Beta

Norton Internet Security 2010 BetaWelcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta! We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system. To access the Public Beta build, simply navigate to Norton Beta Center and select Norton Internet Security 2010 or Norton AntiVirus 2010. After you complete registrat...
Read More
Kudos0

Phishing attacks on Facebook users point to efforts to mine login data for profit

A new wave of phishing attacks on Facebook users is underway. You'll remember the story from several months back of someone whose login credentials were stolen and then the crook used that Facebook access to swindle the victim's friends out of thousands of dollars. The current effort resembles that one, in that a compromised account sends a malicious link to friends. The friends click on the link and are taken to a site that looks just like a Facebook login page. Providing the criminals with their login and password can sometimes injure the victim beyond the damage to their social net...
Read More
Kudos1 Stats

Get in the know about Conficker

Symantec's Internet Safety Advocate Marian Merritt gives the lowdown on the Conficker worm and how you can stay protected.For more information on the Conficker worm, visit the Conficker Working Group page at:http://www.confickerworkinggroup.org/wiki/pmwiki.php?n=ANY.RepairToolsorwww.norton.com/conficker
Read More
Kudos1 Stats

Cloud AntiVirus Forecast: Foggy, with a Chance of Irrelevance

We’ve been hearing a lot about cloud computing lately. Seems like just about anything you can tuck away into the clouds gets better, or so the story goes, since it allows everyone to access it from anywhere and harness the power of humongous databases full of useful information, among other benefits. Sure enough, the recent RSA conference had its fair share of hype on cloud computing and it has been mentioned to do everything from change security as we know it to solving the imminent swine flu pandemic. On the heels of RSA, a new “cloud antivirus” (AV) solution has been introduced which ha...
Read More
Kudos0

Gamer Gets Pwned by His AntiVirus (Episode 3): The Nightmare

Our gamers get set up as the main course in an all-you-can-eat human buffet...
Read More
Kudos1 Stats

Chocolate-Covered PIFTS, X-Files & Mea Culpas

Ever had one of those days? You really intended for things to go right, but they didn’t. And they didn’t simply whimper out of existence, but left large, smoking holes in the living room carpet. That was this Tuesday. In truth, it began on Monday evening around 4:30 p.m. Pacific when we released a patch, the infamously named “pifts.exe,” which left the building before we signed it. This is a process that has worked like clockwork for many years, but due to a simple mistake, the patch wasn’t signed and was instead sent out to Norton AntiVirus and Norton Internet Security customers using th...
Read More
Kudos0

Symantec Comments on PIFTS.exe

 Symantec released a diagnostic patch "PIFTS.exe" targeting Norton Internet Security and Norton Antivirus 2006 & 2007 users on March 9, 2009. This patch was released for approximately 3 hours (4:30 - 7:40 PM March 9, 2009 Pacific Time). In a case of human error, the patch was released by Symantec "unsigned", which caused the firewall user prompt for this file to access the Internet. The firewall alert for the patch caused understandable concern for users and began to be reported back to Symantec. Releasing a patch unsigned is an extremely rare occurrence that does not pose any security ...
Read More
Kudos1 Stats

Social engineering: meh or muh-oh?

Social engineering: meh or muh-oh? There’s been a lot of news lately about the CanSec security conference where all the major Web browsers were “hacked”. The attack for the Safari Web browser required the user to click on a link, after which complete control of the machine was given to the attacker. Is that a real attack since it required somebody to click on a link? Aren’t viruses all about hacking into somebody’s machine without them doing anything? Not really. The Internet landscape has changed a lot recently. Not too long ago, a virus or worm could infect your computer while it just sa...
Read More
Kudos0

The Latest in the Threat Landscape - Web Based Attacks: February 2009

As we talk to consumer and enterprise customers, we are finding many don’t understand the risks of the Internet today, why their computers have been compromised or how the threat landscape has really changed.  The fact that just visiting your favorite Web site can either lead to malware silently being installed on your computer WITHOUT ever clicking on anything, or being plagued by misleading applications, such as fake antivirus software, seems to be a surprise to many users and IT managers.     With the increase in Web based attacks that users are being subjected to every day, we w...
Read More
Kudos0

Gamer Gets Pwned by His Antivirus (Episode 2): The Celebration

A N00b MMORPG guild celebrates a great victory and experiences an unexpected defeat. This is the second episode of our "Gamer Gets Pwned by His Antivirus" series.
Read More
Kudos0

Gamer Gets Pwned by his Antivirus (Episode One)

Here is episode one of our "Don't Get Pwned by Your AntiVirus" series...(enjoy)
Read More
Kudos0

Norton Online Family and Fatherhood

I haven't made a post on here in a while, and there's a good reason.  I've been keeping my head down, working hard with my teammates on Norton Online Family.  Now that the beta has been released you can see the fruits of our labor for yourselves.   I am really excited about this product.  I'm not a parent yet, but my wife is expecting our first child at the end of July so I have spent a lot of time over the last year or so thinking about what type of father I aspire to be as well as thinking broadly about the unique problems related to keeping your family safe online.  I'm no parentin...
Read More
Kudos0

You thought typos were harmless?

A recent PCMag.com blog post points out that the fake White House website whitehouse.org (no, I won't link you to it) has been hacked and is serving up malware.  Part of the issue here is that many people attempting to go to the government website www.whitehouse.gov will accidentally mistype it as whitehouse.org.  This is a specific case of a very real threat. If you look at the list of the top 500 most popular websites according to Alexa.com.  How many of these domain names are easily misspelled or mistyped?  There is nothing stopping bad people from registering common typos of popular do...
Read More
Kudos0

Walt Mossberg on Social Engineering

As a follow-up to my earlier post this week, I noticed that Walt Mossberg  posted today a helpful article and short video clip on "social engineering" that offers several specific tips on avoiding online scams.  For example: 1. Never, ever click on a link embedded in an email that appears to come from a financial institution, even if it’s your own bank or brokerage and even if it looks official right down to the logo. The same goes for payment or auction services, like PayPal or eBay (EBAY). More solid tips are available at Mossberg's All Things Digital site.  I also recommend related post...
Read More
Kudos0

Malware can come from anywhere…

Earlier today I came across a CNET blog entry wherein Ina Fried discusses the recent purchase of a refurbished iPod that arrived with a virus on it.  Although Ina's article is about an iPod, it reinforces the reality of today's threat landscape: malware can come from anywhere. As we look at the Genesis of Computer Viruses (see The Art of Computer Virus Research and Defense, by Peter Szor), we can't help but remember the days when the vast majority of personal computer malware spread via physical interaction between computers, usually in the form of floppy disks.  These early viruses operat...
Read More
Kudos0

Cybercrime is big, troubling business

I was surfing through some security news this weekend and ran into an interesting article on SecurityFocus. The article references a report that states that the reported damages from cybercrime and fraud rose by more then 20% from 2006 to 2007. One interesting piece of information turned up by the report is that while identity theft is the most commonly cited example of cybercrime, other criminal activities like auction fraud are causing greater monetary damage. This is alarming to me both as a consumer and as a developer of security software. As a consumer if I want to buy something on eB...
Read More
Kudos0

Are game accounts getting stolen? Really?

How crazy is it that cybercriminals are designing malware to steal log-ins for our online game accounts? Are they really that valuable? I can understand wanting to steal my credit card or bank account number. I can understand wanting to steal my identity so they can open new credit accounts in my name and stick me with the bill.   But, my game account? Really?   Over the last few years, various security companies (including Symantec) and several independent security agencies have published reports about the growing prevalence of Trojans aimed at stealing online game account log-ins. Rece...
Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos2 Stats

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future. Corporations and even smaller businesses are an extremely attractive target to cybercriminals, simply due to the large payday of data that can be stolen.  What Can Cybercriminals Do With My Stolen Data? The main...
Read More
Kudos1 Stats

What Happens When Your Identity Is Stolen?

The IRS has announced that it will be notifying taxpayers after third parties gained unauthorized access to information on about 100,000 accounts through the “Get Transcript” online application. You can view more about the breach via a statement on the IRS’s website. More About Identity Theft: According to the Federal Trade Commission’s 2014 Consumer Sentinel Network Data Book, identity theft once again tops consumer complaint categories in 2014. Identity theft can be committed in many ways: from non-technical methods such as stealing purses or “dumpster diving” for documents that have ...
Read More
Kudos2 Stats

Data Breaches Aren't Going Away- What You Need To Know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks are becoming the new wave of crime. Corporations and even small businesses are extremely attractive targets to cybercriminals, simply due to the large payday of data that can be nabbed in one fell swoop. What is a data breach and how and why do they happen? The main reason that cybercriminals are stealing personal information is for us...
Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos1 Stats

How To Protect Yourself From Cyberstalkers

With the wealth of information available online, this makes it easier for Cyberstalkers to gain access to their victims. Read on to learn about ways to keep your personal information hidden from unwanted eyes.

Read More
Kudos1 Stats

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.

Read More
Kudos1 Stats

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.

Read More
Kudos1 Stats

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos2 Stats

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts. In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company...
Read More
Kudos1 Stats

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot...
Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
Read More
Kudos1 Stats

Mobile Scams: How-to Identify Them and Protect Yourself

With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.

Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream me...
Read More
Kudos1 Stats

Online Dating and Protecting Your Privacy

This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers. What are the risks? As with anything you post online, it’s out there for everyone to see, so you will want to be careful with what identifiable information you u...
Read More
Kudos1 Stats

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus. There are the obvious precautions to take in protecting your devices, such as never le...
Read More
Kudos2 Stats

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now. What can cybercriminals do with my data in the event of a banking or financial institution breach? Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
Read More