• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

Gamer Gets Pwned by his Antivirus (Episode One)

Here is episode one of our "Don't Get Pwned by Your AntiVirus" series...(enjoy)
Read More
Kudos0

Norton Online Family and Fatherhood

I haven't made a post on here in a while, and there's a good reason.  I've been keeping my head down, working hard with my teammates on Norton Online Family.  Now that the beta has been released you can see the fruits of our labor for yourselves.   I am really excited about this product.  I'm not a parent yet, but my wife is expecting our first child at the end of July so I have spent a lot of time over the last year or so thinking about what type of father I aspire to be as well as thinking broadly about the unique problems related to keeping your family safe online.  I'm no parentin...
Read More
Kudos0

Are game accounts getting stolen? Really?

How crazy is it that cybercriminals are designing malware to steal log-ins for our online game accounts? Are they really that valuable? I can understand wanting to steal my credit card or bank account number. I can understand wanting to steal my identity so they can open new credit accounts in my name and stick me with the bill.   But, my game account? Really?   Over the last few years, various security companies (including Symantec) and several independent security agencies have published reports about the growing prevalence of Trojans aimed at stealing online game account log-ins. Rece...
Read More
Kudos0

New Trojan Attacks Pirates

  We all know that software piracy is bad--it hurts the people who write software for a living--but it can also be dangerous. Case in point: the recent OSX.Iservice Trojan horse discovered today (January 22nd). Apparently, someone has uploaded Apple’s popular iWork 09 suite and added a Trojan horse to the installer.Some background: When software developers create an installer for the Mac, it's often several mini-installers, or packages, that are run in a particular sequence. Each package (.pkg file) contains specific code and a script makes sure that the code is placed in the right part of...
Read More
Kudos0

Macworld 2009

As Alec Baldwin remarked in State and Main, "Well, that happened." Pretty much sums up this year's MacWorld Expo, which ended this week in San Francisco.  As I have done for several years (my first ad was in 1985), I made the annual pilgrimage to Moscone Center to meet up with my fellow Mac-heads, eager to see what was happening with Apple and other software and hardware makers and just enjoy what the world might be like if everyone used a Mac, if only for a few days.MacWorld's an interesting phenomenon. In the early days of the Macintosh (as we called it back then), it truly was the best ...
Read More
Kudos0

Twitter Users Attacked by Phishing Efforts

Email, cell phones, Facebook and now Twitter all have something in common: they are being used by fraudsters for phishing attacks. If you are a Twitter subscriber you should be aware of these recent phishing efforts and how to protect yourself. You may even have received a warning from Twitter in the past few days. Here's the short and sweet (if I were really good at Twittering, I'd write this entry in 140 character segments but I'll spare you in the interest of getting you the facts): Chris Pirillo broke the story on January 3rd: "Phishing Scam Spreading on Twitter" just a few moments aft...
Read More
Kudos0

Anybody need PC help?

It seems like having a computer equates to having PC problems.  We've all been there.  You are sitting at your desk and your computer's speed is crawling while you are trying to get something done.  Very frustrating.  It's not clear what the problem is exactly, but it is clear that your computer isn't running as fast as it use to.  You think maybe it's all of the music and photos you've downloaded?  Or maybe it's just the fact that your computer is a couple of years old?  It's time to put an end to slow computers and PC frustrations.  There's a free new application from NortonLive that wil...
Read More
Kudos0

Head in the Clouds

I've been doing a lot of thinking about Cloud Computing lately.  This was sparked, in large part, by Symantec's internal engineering conference, Cutting Edge, as well as a number of things I've been reading.  Cloud Computing is shaping up to be one of the "next big things" that we are all going to be hearing a lot about over the next couple of years.  In fact, Microsoft just announced "Azure," their cloud computing services platform. Microsoft Azure is positioned to bring cloud computing to the development masses.  Anyone will be able to write cloud-aware applications and run them hosted i...
Read More
Kudos0

Faster, Lighter NortonSystemWorks 12.0 Handles Today’s Top PC Performance Problems

Whether it’s defragging, cleaning and repairing the hard drive, maintaining your PC with a one-click checkup tool, or getting rid of unwanted Internet clutter, Norton SystemWorks delivers a comprehensive toolkit for faster, up-to-the-minute performance boosting utility tools.   One of the most significant improvements in Norton SystemWorks is that it delivers the enhanced performance of Norton AntiVirus 2009. You may have read about how we reengineered our 2009 products to make them the fastest and most up-to-the-minute security solutions. Norton SystemWorks 12.0 customers now save time w...
Read More
Kudos0

The Norton Pulse Updates Feature

The Norton Pulse Updates Feature   Summary It’s a simple truth: The faster virus definitions are received, the better the protection is for the computer. Norton 2009 has added a new technology, called Norton Pulse Updates, which downloads new virus definitions almost as soon as they are created, without sacrificing reliability or performance.   When new virus definitions are created, they are posted right away as small Pulse Updates. Every five minutes, Norton LiveUpdate downloads the latest Pulse Updates and they are incorporated into the customer’s PC virus protection immediately.   Puls...
Read More
Kudos0

Pwned: The John4356783 Story

A year ago we reached out to the gamer community at DreamHack in Sweden to find out what they wanted from their anti virus software and more specifically what they didn’t want. Their biggest request was for anti virus that didn’t use up precious PC resources.  They also asked for security software that wouldn’t interrupt them when they were gaming. Some of them even asked for anti virus that would automatically change its mode of operation to accommodate them appropriately when they were gaming versus when they were surfing. Of course we could have just walked down the hall and talked to s...
Read More
Kudos0

AMTSO: Reviewing the Reviews

In January of this year, Symantec became a founding member of the Anti-Malware Testing Standards Organization (AMTSO). Symantec and about 40 of the leading academics, reviewers, testers and vendors in the security industry joined forces to form the organization dedicated to helping improve the objectivity, quality and relevance of anti-malware technology testing. Since then, we’ve met several times and shared numerous spirited debates, but something we have agreed upon since our inception is the charter of the organization: ·         Providing a forum for discussions related to the testing...
Read More
Kudos0

TwitViewer.net - Or How Something That Sounds Too Good to Be True Usually Is

The message might have come in early yesterday on your Twitter feed, "Want to know whos stalking you on twitter!?: http://twitviewer.net/" You might have clicked the link to visit the website. It all happened so fast, the fabulous offer (heck yeah, I want to know who the last 200 people are to look at my Twitter profile!) and the large scale distribution of the "tweet". Even seasoned journalists who should always wear their cynical and world-weary thinking caps fell for it. Yes, Virginia, it was a phishing scam that required people to cough up their Twitter username and password. It's true...
Read More
Kudos0

Live from WWDC 2009

Symantec's Mac product manager, Mike Romo is attending the Apple WW Developer Conference in San Francisco this week and shares some thoughts from this morning's keynote address in this video...Message Edited by Sondra_Magness on 06-08-2009 05:41 PM
Read More
Kudos0

Phishing attacks on Facebook users point to efforts to mine login data for profit

A new wave of phishing attacks on Facebook users is underway. You'll remember the story from several months back of someone whose login credentials were stolen and then the crook used that Facebook access to swindle the victim's friends out of thousands of dollars. The current effort resembles that one, in that a compromised account sends a malicious link to friends. The friends click on the link and are taken to a site that looks just like a Facebook login page. Providing the criminals with their login and password can sometimes injure the victim beyond the damage to their social net...
Read More
Kudos0

The Latest in the Threat Landscape - Web Based Attacks: February 2009

As we talk to consumer and enterprise customers, we are finding many don’t understand the risks of the Internet today, why their computers have been compromised or how the threat landscape has really changed.  The fact that just visiting your favorite Web site can either lead to malware silently being installed on your computer WITHOUT ever clicking on anything, or being plagued by misleading applications, such as fake antivirus software, seems to be a surprise to many users and IT managers.     With the increase in Web based attacks that users are being subjected to every day, we w...
Read More
Kudos0

Norton Internet Security 2010 Beta

Norton Internet Security 2010 BetaWelcome to the Norton Internet Security 2010 and Norton AntiVirus 2010 Public Beta! We’re really excited about his year’s version of Norton Internet Security 2010 and Norton AntiVirus 2010. We’ve made significant improvements to our existing features, as well as added a few new ones. We’ve also included support for Windows 7, the new upcoming version of Microsoft’s popular operating system. To access the Public Beta build, simply navigate to Norton Beta Center and select Norton Internet Security 2010 or Norton AntiVirus 2010. After you complete registrat...
Read More
Kudos0

Microsoft Security Essentials: “Reruns” Aren’t Just for TV Anymore

If you watch television in North America, you’re probably familiar with the concept of summer “reruns.” Many television networks and production studios go on hiatus during the late spring and summer months, and don’t produce new shows. To fill the airwaves, TV networks resort to rebroadcasting old shows, known as “reruns.” Well, it looks like reruns are no longer confined to TV shows or to the summer. Today, Microsoft released a “new” consumer security offering, Microsoft Security Essentials (MSE). Instead of actually offering something new or improved to help consumers in the battle again...
Read More
Kudos0

Introducing Norton Labs

Today, the Norton team is excited to introduce Norton Labs, an online community where users can download new security technologies and share input directly with developers-- ultimately helping to shape our future products and features.  We created Norton Labs to foster a dialogue with our customers and bring them into our development process.  It gives us an outlet to showcase technology under development and get valued feedback from our most sophisticated users.  Also, Norton Labs gives us the flexibility to introduce key functionality outside of our standard development cycle.  Based on ...
Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream me...
Read More
Kudos0

What’s the Safest Way To Pay This Holiday Season?

There’s already enough to stress about with the upcoming holiday season- finding the perfect present for everyone on your list, making holiday treats for friends and neighbors, and of course, sending out all of the holiday greeting cards. One less thing that needs to be added to that list is the stress of a credit card data breach. This holiday season, we’re examining all of the ways to pay, on and offline, and the safest way to take care of all of your holiday purchasing needs. Credit Cards and the Recent POS Breaches The topic of data breaches and identity theft has been in the med...
Read More
Kudos0

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. While...
Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos0

How Do Cybercriminals Make Money?

Since most of what we do is now online, from shopping for food to paying bills, the global economy is taking a digital shift. It’s only natural for criminals to follow suit. As criminals consider the economics of what they do, they recognize cybercrime as one of the quickest ways for them to make money. For a hacker, extortion is an easy way to monetize stolen information and provides the shortest path from cybercrime to cash. In addition to extortion, criminals can make money off of fake auctions, stealing someone’s identity, and by selling stolen information such as credit card numbers, ...
Read More
Kudos0

College Kit: How To Keep Devices Secure and Information Safe

College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence. College and technology go hand-in-hand. You use your computer for research and term papers, your phone to keep track of your class schedules, and your tablet to keep up with old and new friends on social media. Technology is a great tool for connecting us all, but that’s the thing- it connects EVERYONE- including cybercriminals.  For e...
Read More
Kudos0

High School Kit: More Independence Online

You’re learning how to drive, looking into potential colleges, getting your first “real” girlfriend or boyfriend, going to dances, parties, making new friends and having fun!  With all of this newfound independence comes amazing new adventures and experiences in your life. It is easy to get caught up in the excitement, but, along with all of your academic studies and extra curricular activities, an education in cyber security can help keep you safe while you keep exploring. Do’s and Don’ts of Cyber Security Phishing 101Phishing is a con game that takes place online, and phishers are ju...
Read More
Kudos0

Grade School Cyber Security Kit: Online Safety 101

The Internet can be a place of endless wonders. It’s where you learn, talk, shop, and play. Still, the Internet is just like anything else in life- there are important rules that everyone should follow in order to make sure they stay safe while online. Follow the Internet rules at school and at home: How much screen time is too much? It’s really easy to get caught up visiting fun websites, and playing awesome games, but there’s also a whole big world to explore, away from the screen! Know when it’s time to put down the mouse and go outside and play. Come to an agreement with your paren...
Read More
Kudos0

Apple’s iOS 9 Shines The Spotlight On Security

It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, such as the iCloud photo breach, an iCloud password vulnerability, and the more recent keyraider malware, Apple took notice and significantly upped their security game. Private Means Private! iOS 9 will not tie any usage data to an Apple ID or any other Apple service. The data is now completely anonymized, and Apple states that they w...
Read More
Kudos0

8 Elements to Help You Become a Great Digital Citizen

"Digital Citizenship" is the umbrella term used to describe the expectations of a digital citizen. If you use the Internet on a regular basis, you are a digital citizen! Just like being a citizen in the physical world, a lot of the same rules apply when you are a citizen of the digital world. Here are eight elements that embody what it takes to be a good digital citizen: Digital commerce: Citizens should recognize that a large share of the economy is now based online. As a result, there are both pros and cons to e-commerce, and a good digital citizen should not only be aware of the bene...
Read More
Kudos0

Your Evolving Digital Life With the Internet of Things

The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things”  it refers to any object you can connect to with the Internet. These "things" include an array of devices and even systems. Either way, the Internet of Things promises to connect more devices than ever before.

Read More
Kudos0

Building the Next Generation of Cyber Professionals

As more of what we do online grows, so does the need for cyber security professionals. Now that everything is connected, criminals are shifting their focus to the Internet landscape, utilizing social engineering and other types of scams to obtain financial and personal data from unsuspecting victims.

Read More
Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading. The Menace of Mobile Malware Mobile malware is the same kind of malware on computers, except it is engineered for your phones and tablets. Mobile malware is out to get you. Well, the details about you, anyway. As the popularity of smartphones and tablets grows,...
Read More
Kudos0

What Is Spear Phishing?

Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for your password or other private information, spear phishing takes this trick to the next level, using social engineering. Before you respond to that email asking for you to verify your address or other personal information, read this article to protect yourself against spear phishing.

 

Read More
Kudos0

Types of Common Mobile Threats and What They Can Do to Your Phone

If you know anything about online security, you know that your phone is even more susceptible to malware than your computer. It gets worse. Once your phone is hacked, your computer can easily be next. That’s because your total online security is only as secure as the weakest link in the chain.

Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Monitoring Your Financial Accounts

Norton has asked the North Pole’s #1 IT Elf to give you some tips for the Holidays. It might sound simple, but the best way to be safe during the Holidays is to monitor your accounts. Here Kirby gives some simple rules to keeping an eye on your accounts and what to do if you see some thing that shouldn’t be there. Kirby gives you simple steps to stay safe
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Old School vs Digital Wallets

Now that payments are regularly being made from phones and watches, Kirby gives you a run down of why digital wallets are becoming more popular, how they work and some issues to consider.
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags. 

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Holiday Scams

Meet Kirby the IT Elf, and Santa's right hand technology man. As the Holidays quickly approach, so do a fresh crop of scams. In this episode, Kirby highlights the most popular scams this year, how to spot them and how to be safe.

Read More