• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading. The Menace of Mobile Malware Mobile malware is the same kind of malware on computers, except it is engineered for your phones and tablets. Mobile malware is out to get you. Well, the details about you, anyway. As the popularity of smartphones and tablets grows,...
Read More
Kudos1 Stats

Testing and Accountability

AMTSO (the Anti-Malware Testing Standards Organization) is a coalition of security professionals, including many antivirus product vendors, product testing organizations and publishers, and some interested individuals. Given the highly technical nature of its activities, it is inevitable that the organization owes some of its authority to the expertise of the security specialists within its ranks, but that doesn’t make it a vendor lobby group. As Kurt Wismer (not himself a member) points out here (http://anti-virus-rants.blogspot.com/2010/06/nss-labs-vs-amtso.html) “many of them are employ...
Read More
Kudos7 Stats

Thank you, Steve

When Steve Jobs died this week, I found out via my Twitter feed. I was working on my Mac and putting together a presentation discussing our plans to continue innovating on the Apple platforms - I had just dropped in a graphic of Apple's new iPhone 4S. When I read the news, I gasped. I sat for a second and, almost by reflex, just typed "Steve Jobs is dead," sharing the news with my online community. Within seconds, my Twitter feed was an avalanche of disbelief, and for hours, people from around the world shared their grief, the vast majority of them sharing their words on Apple devices. I...
Read More
Kudos2 Stats

Thanksgiving - Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.

Read More
Kudos1 Stats

The 12 Days of Norton

"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year."

Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.

Read More
Kudos1 Stats

The 12 Scams of Holidays Past

On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!

Read More
Kudos3 Stats

The 2016 Online Dating Guide

While Valentine’s Day is for lovers, we bet you didn’t know that there is a holiday for the single folks as well! Singles Awareness Day was created as an alternative to Valentine’s Day, and whether you’re celebrating or commiserating your single status, we’re pretty sure that many of you have crossed paths with an online dating site at some point. Nowadays, online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. 70% of compromised users are wome...
Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos3 Stats

The 5 Stages of Phone Loss Grief

It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat. After what seems like an eternity, you come to the crushing realization that you have lost one of the most valuable material possessions...
Read More
Kudos1 Stats

The Basic Steps to Online Safety and Security- NCSAM Week 1

Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age, that is not the case. The threat landscape has evolved just as our technology has. The more devices that are out there equal more things for cybercriminals to attack. Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as installing antivirus on a computer anymore. A good foundation to personal cybersecurity is knowledge. Since threats don’t come solely in digital f...
Read More
Kudos0

The Big Shift

One of the best parts of my job is not just laying out the strategy for Symantec's Consumer Business, but getting out and telling people where Norton is headed in six months, 12 months, or even two years. Why is this so rewarding? Because we've got a rich and compelling story to tell.  We aren’t just talking about security software — we're looking at solving consumer problems in brand new ways. Recently, I've spent some time sharing our vision with some of the key people in our industry. Neil Rubenking at PC Magazine was one of our stops and following our conversation, he put out a compreh...
Read More
Kudos1 Stats

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos2 Stats

The Day I Thought Cybercriminals Left Me For Dead

Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for a moment out of shock, and assured her I was very much alive and well. She went on to explain how she’d never seen anything like it before. As the initial shock wore off, we started to have a bit of a laugh on how bizarre this was. 

Read More
Kudos3 Stats

The Dos and Don’ts of Using Public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.

Read More
Kudos2 Stats

The Facts About Jailbreaking iOS Devices

While jailbreaking an iPhone seems to open up the device to limitless possibilities, it is actually, in fact, a large security risk for your phone. Jailbreaking can allow users to bypass many iOS restrictions they might consider limiting, such as being only able to download apps from the Apple iOS App Store and other types of personal customizations of the device. However, this also means that cybercriminals have access to a much larger security hole to attack the device.  All Apple devices carry a “sandboxing” feature that is native in all OS’s. Sandboxing is a program that essentially ...
Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos2 Stats

The Future of the Connected Home: Security in the Internet of Things

4.9 billion connected things are expected to be in use in 2015, increasing to 25 billion by 2020. Many of these smart devices can be found in the connected home. Symantec researchers have found that smart home devices have basic security issues, such as weak authentication and common web vulnerabilities. These can be exploited by hackers posing a privacy and security risk. Safeguards against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks and actionable tips to stay safe in the internet of things...
Read More
Kudos0

The Hunt is On

Our team team hit a big milestone this week by reaching beta of our 2009 Norton Internet Security and Norton AntiVirus products. As many of you know, beta is a pre-release version of a Symantec product that is available for public testing before the final version is released. We rely on the valuable feedback of our community to evaluate how the product performs in "real world" environments. Additionally, it is an opportunity to be among the first to experience our latest products before they are finalized and released. We monitor the beta feedback closely and it is an important source of f...
Read More
Kudos8 Stats

The Identity Safe Portal is here!

If you’ve been keeping up with Norton products, you probably already know that Norton Internet Security (NIS) 2012 included new capabilities that gave you the option to store your Identity Safe Vault (passwords, credit card numbers, and other data) in the Norton cloud and share it between all your computers with Norton Internet Security 2012. Up until now, however, your Vault could only be accessed from a computer with Norton Internet Security 2012 installed. Today we’re launching identitysafe.norton.com, a web portal which allows you to access your Identity Safe Vault from any web browse...
Read More
Kudos2 Stats

The Importance of Data Back-Up

Have you ever lost a lot of really important data? Or, alternately, have you ever had a moment of panic where you thought you did? Whether it’s images of a family vacation, a report from work or a semester’s worth of homework, you probably have data on your computer that’s not just valuable, it’s too valuable to lose. Backing up your data regularly will help you to avoid the crushing feeling that comes with finding out that all your hard work and treasured memories are gone. The Importance of Backing Up Let’s face it, no matter how great your computer or external hard drive are, one da...
Read More
Kudos5 Stats

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More
Kudos4 Stats

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.

Read More
Kudos0

The Incredible Hulk Gets Nortonized - Literally

I don't know about you, but growing up The Incredible Hulk was one of my favorite comic books. I always loved the raw nature of the Hulk and his crazy rampages and willingness to take on just about anything from tanks and mutants to other superheroes in the Marvel universe. The new Hulk movie premieres on the big screen this weekend and I'm excited to see Edward Norton bring my favorite character to life. Closer to home, our Norton team partnered up with this summer blockbuster and is offering up some pretty decent loot (think 52" SHARP LCD TV) -- the details of which can be found at this ...
Read More
Kudos0

The Latest in the Threat Landscape - Web Based Attacks: February 2009

As we talk to consumer and enterprise customers, we are finding many don’t understand the risks of the Internet today, why their computers have been compromised or how the threat landscape has really changed.  The fact that just visiting your favorite Web site can either lead to malware silently being installed on your computer WITHOUT ever clicking on anything, or being plagued by misleading applications, such as fake antivirus software, seems to be a surprise to many users and IT managers.     With the increase in Web based attacks that users are being subjected to every day, we w...
Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos1 Stats

The New Model of Consumer Protection: Reputation-based security technology

(view in My Videos) In just the past few years, the threat landscape has significantly changed – and traditional antivirus technologies can’t keep up. Attackers generate literally tens of thousands of new malware variants every day, often distributing each variant to just a handful of users. That means that each time a new victim visits an attacker’s web site, a slightly different piece of malware is served up. How can a security vendor ever hope to discover each of these thousands of variants?   We call this problem “server side polymorphism” and we’ve seen it grow over several years. Yo...
Read More
Kudos3 Stats

The New Norton

Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.

Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos1 Stats

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Three: Diana Shafer

So far, we've uncovered some amazing young people during our search for the next cyber heroes! In our third installment of this series....

Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Two: Joseph Garcia

As Norton's search for Cyber Heroes continues, we'd like you to meet Joseph Garcia.

Read More
Kudos0

The Norton Pulse Updates Feature

The Norton Pulse Updates Feature   Summary It’s a simple truth: The faster virus definitions are received, the better the protection is for the computer. Norton 2009 has added a new technology, called Norton Pulse Updates, which downloads new virus definitions almost as soon as they are created, without sacrificing reliability or performance.   When new virus definitions are created, they are posted right away as small Pulse Updates. Every five minutes, Norton LiveUpdate downloads the latest Pulse Updates and they are incorporated into the customer’s PC virus protection immediately.   Puls...
Read More
Kudos1 Stats

The Performance Strategy Behind Norton 2011

A few years ago we threw down the gauntlet, challenging the idea that performance must be traded away in favor of security. To accomplish our mission, we changed ourselves and in the process, changed the entire conversation, shifting the focus to include not only effectiveness and accuracy but minimum performance impact felt by the customer. But we’re an industry leader, so rehashing the previous cutting-edge methods won’t do. In 2011, we’ve picked up our own challenge and turned in a new direction, pushing ourselves to go even farther for the betterment of our customers. In order to do...
Read More
Kudos1 Stats

The Personal Impact of Cybercrime

Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime within the last year alone. The reason for this staggering number is simple. Most people don’t take the right precautions to protect their digital lives. While some are unaware of online dangers others think it can be dealt with after it happens. The truth remains that cybercrime is evolving rapidly and impacting the daily and digital lives of people. Revealed in a survey conducted last ye...
Read More
Kudos5 Stats

The Real Cost of Free: #30SecTech Video

With plenty of free security software options out there, it’s easy to wonder why you would want to pay for online protection. But is free antivirus software truly free? Internet connected devices are constantly within reach and as a result more aspects of our lives and information reside within our devices than ever before. Yet many people still see their online world and the physical world as separate from each other, not realizing that online information is as valuable to cyber criminals as a wallet is to a mugger. It’s not until a data breach makes headlines t...
Read More
Kudos3 Stats

The Risks of Public Wi-Fi

Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte? What Is Public Wi-Fi? Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots”...
Read More
Kudos1 Stats

The Risks of Third Party App Stores

Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore yourself, at risk. What Third-Party App Stores Do Dangerous third-party app stores work via malicious advertising or even code. The ads or codes are “injected” into popular apps users purchase through these stores instead of legitimate options. While not all third-party apps are “bad,” many stores bait users by offering popular apps for much cheaper prices, and subsequently put user privacy ver...
Read More
Kudos0

The Shoemaker’s Children

You remember the Shoemaker’s lesson, don’t you?  It’s always the shoemaker’s children go barefoot. And so it was that after thirty years of writing about PCs and wagging my finger at those who tempted fate by not backing up regularly, I did it myself.  The entire episode has made me feel a little addle-brained, a lot chagrined, and like a cautionary tale.   It started when I bought the new Dell XPS—fully loaded. When was the last time you moved three years of work from one PC to another? Seriously, it consumed my free time for about three weeks until I had things the way I wanted them. You...
Read More
Kudos5 Stats

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things. However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices. What Is a Smart Home? While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
Read More
Kudos1 Stats

The smarter home: How to cut the cord with a smart TV

Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from cable service providers can be costly, and for many cutting the cord can also cut the bill. If you’re on the fence here are a few tips to get you started and most importantly home network security best practices to consider. Smart TVs are making headlines for faulty security and privacy risks. So when you cut the cord, stream smarter and more secure. Here’s how:  Step one: A smart TV Smar...
Read More
Kudos5 Stats

The ultimate guide to online dating

Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. However, these aren’t issues that should deter you from fishing in the sea of online dating. In this guide, we will take you step-by-step through the entire online dating process. From finding the best dating site, protecting your digital privacy, all the way up to that first date, we’ve got you covered. Step 1 Choosing the right site The cyber-sea of love can be overwhelming to navigate...
Read More
Kudos1 Stats

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos1 Stats

The Worm in the Apple, Part 3 - How to Secure Your iPhone and iCloud in Light of Recent Photo Leaks

We're sure you've heard about the multitude of celebrity photos that were leaked from iCloud accounts. Read on to find out how it was done, and how you can secure your own iCloud account to make sure something like that doesn't happen to you.

Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Things that make you go vrooom!

Right this very moment, the Norton software development team is hard at work making our products faster than ever. But hey, you know what else is fast AND just might help you save a little green on gas?!  A brand-new Vespa!  At the newly launched http://www.NortonToday.com site, we’re looking for videos (maximum two minutes in length) that show someone or something getting “Nortonized.”  Something that’s been “Nortonized” goes faster.  It feels less bogged down.  In short, it performs better than its competitors.  If you have questions, don’t worry: our contest information kit explains eve...
Read More
Kudos2 Stats

Think Twice Before Forgoing Security on The Connected Devices You Receive—or Gift—This Holiday Season!

With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped your list of things to buy. As you search with excitement to find the device that best fulfills your needs, the thought of installing security software on them might not be at the forefront of your mind. However, considering that an alarming 63 percent of mobile device owners fell victim to cybercrime in 2013, it’s important to take steps to keep the information on your mobile devices secure. Past events continue to substantiate that securing all connected devices is the smartest and easiest ...
Read More
Kudos1 Stats

Three Easy Steps to Protect Your Android

You could call mobile devices the new frontier for malware. Malware often appears on mobile devices in the form of an app. These apps sometimes include malicious code that makes the app do things it’s not supposed to do – such as broadcast your location information while you’re searching local maps. Of all the mobile providers and systems, Android appears to be the most vulnerable to invasion by malware because of the openness of its platform. The flexibility that makes for so many awesome apps has the slight downside of leaving open some security vulnerabilities. But fear not! You can pr...
Read More
Kudos1 Stats

Time-Saving Software To Simplify Your Life

There’s no doubt that technology has made many areas of our lives simpler. We can now access files from any device, anywhere, and we can take full advantage of fast internet speeds to do things that weren’t possible just a few years ago. But as we use more technology, that simplicity can be eroded as our devices demand monthly, weekly, even daily updates. Our software applications add new features we didn’t ask for but have to learn and our documents move from one hard disk to multiple locations around the cloud, each with their own logins and capacity limits. Technology can greatly impro...
Read More
Kudos4 Stats

Tips for Migrating to Windows 10

Windows 10 will be available as a free upgrade for Windows 7, 8.1 customers starting July 29th. Following are some tips to help you prepare. 1. Reserve your copy of Windows 10, if you haven’t already. Click the Windows 10 App icon in the system tray of your current device. If you don’t have the Windows 10 App icon, run a Windows update. This should correct the problem on most Windows 7 and 8.1 systems. 2. Check your system compatibility. Windows should notify you of any compatibility problems with your system or software prior to upgrading. However, you can manually check hardware spec...
Read More