• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

When It Sounds Too Good To Be True, It Probably Is (A Scam)

How safe was your family online in the last year? According to Symantec’s Internet Security Threat Report 2014, they weren’t as safe as you might think. The study analyses threat data from over 157 countries, more than 41.5 million attack sensors and a database of over 60,000 vulnerabilities, making it the most comprehensive picture of internet security in the world – and it says mobile users are falling for more “too good to be true” scams than ever. Bad behavior   An incredible 38% of mobile users have experienced cybercrime, and it’s often down to their own behaviour. More than half of...
Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot...
Read More
Kudos0

Who are you on the Web?

The Boston Globe had an article recently on how difficult it is to be anonymous in the internet age.  Reading the article compelled me to perform my every-once-in-a-while "googling" of myself.  What I found was pretty interesting. First of all, I'm not keeping a very low profile.  There were approximately 23,000 responses to the search query on my name (541 if you put my name in quotations.)  Most of the front page stuff was computer related.   A post on an old blog of mine about a web programming framework; several links to my posts on the Norton Protection Blog; a patch I submitted to an...
Read More
Kudos0

Why Backing Up is Easier Than Flossing

For many folks, backing up their data is a lot like flossing. It's a chore and not the most pleasant way to spend a few minutes. You know it's important for good personal or computer hygiene, but you probably don't do it as often as you should. But once teeth start falling out or you lose wedding pictures, contacts, and tax records due to a computer crash, you become a lot more diligent with your flossing and/or your backing up. In fact, I'd wager that backing up is even easier than flossing now.Here's a quick video on why it's important to back up your most important files and how...
Read More
Kudos9 Stats

Why clean computing matters

February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs. ​Why is cleaning up your computer important? Clean software helps protect your data.  Internet security software and regular program updates help ensure that viruses, malware, and remote “hackers” stay out of your system.  When you maintain your files by backing them up, deleting unused programs,...
Read More
Kudos5 Stats

Why Hackers Love Public WiFi

A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Online Crime Takes Many Forms The Norton Cybersecurity Insights Report announced that 594 million people around the world were victims of cybercrime in 2015, with 21% of Americans getting their email hacked and 12% having their financial data stolen after shopping online. With public Wi-Fi available everywhere, what seems like a conveni...
Read More
Kudos5 Stats

Why I Do It: A Support Agent’s Tale

Why I Do It: A Support Agent’s Tale Why I do it I have always loved computers. I also worked in health care for ten years, and that gave me a wonderful perspective on helping people. I have been able to carry over that experience to my current position as a Norton Technical Support Agent and it provides me with the ability to offer my customers a positive experience in the middle of a stressful situation.  It's always a great feeling when I finish a call, and someone who used to be really upset is now really happy. Saving digital lives I remember one custom...
Read More
Kudos4 Stats

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.

Read More
Kudos0

Why Symantec Says That The Covert Redirect Flaw in OAuth and Open ID is 'Not As Bad As Heartbleed'

Some media outlets are sounding the alarm about the recently discovered Covert Redirect flaw in OAuth and OpenID being “the next Heartbleed.” Symantec experts have assured people that it’s not. What is this Covert Redirect flaw? The vulnerability exploits web and mobile applications that allow users to login via OAuth (an application that lets 3rd parties access account details from other websites, such as social media sites). It allows attackers to disguise a fake login popup, using the affected website’s real domain. These attackers can collect login information from users if they autho...
Read More
Kudos3 Stats

Why Your Online Privacy Matters

To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide. What Is Privacy? Privacy is closing your bedroom curtains when getting ready for bed. Privacy is visiting with your doctor behind closed doors. While in real life this type of privacy comes naturally, with little thought, in the digital s...
Read More
Kudos0

Will Amazon’s Fire Phone "Burn" Users?

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone. For the original article, and to catch the latest security intelligence information, check out Symantec's Security Response blog: http://www.symantec.com/connect/blogs/will-amazon-s-fire-phone-burn-users     Everyone has heard stories about smartphones with malfunctioning battery packs bursting into flames, but the new Amazon Fire Phone, despite its name, could pose a different kind of danger. Amazon’s recently announced device is due to be released in July and may present some pote...
Read More
Kudos13 Stats

Windows 10 Compatibility With Norton Products

As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are also entitled to receive free support at http://support.norton.com. If you’re using Windows 7 or 8, you may have already reserved an upgrade to Windows 10 before its July 29th release. After doing so, Microsoft’s app compatibility checker may show that your Norton product is incompatible with Windows 10. Not to worry- you’re still protected with the best in-class security for your PC. There will be an update available for a Windows...
Read More
Kudos4 Stats

Windows 10: New Security Features and the Role of Third Party Security

Just like everyone else, we’re excited about Windows 10 this year. We particularly look forward to new security improvements that Microsoft brings to Windows with each new release. While this may sound like a strange position for a security company to take, the reason why we welcome these improvements is that every security improvement, no matter how big or small, is bad for hackers and criminals and good for consumers.  Like the majority of customers in the market, we’re also customers of Microsoft Windows and we recognize that Microsoft Windows is an attractive target for criminals.

Even with all of the new features, Microsoft Windows’ “attack surface” continues to grow with each new release. Microsoft-developed security improvements and features can play an important role in helping to reduce the attack surface of each new Windows release.

Read More
Kudos0

World Backup Day and Digital Spring Cleaning

March 31 marks World Backup Day! What is backup? It's a second copy of all your most important files like financial documents, family photos, videos and more. While it's best to backup your files regularly now is as good a time as ever.  Here are a few more tips for digital spring cleaning! Read on.    Five easy ways to get started on digital spring cleaning:   Be sure your software is up to date. Ignoring the latest software updates could put you at risk. Companies announce security vulnerabilities as they are discovered and quickly work to fix the vulnerabilities with software updates,...
Read More
Kudos0

WWDC08 - All iPhone, All the Time

  This is where the magic happens...WWDC08 I was up in San Francisco last week for the Apple WorldWide Developer's Conference (WWDC08) and I figured I would talk a bit about it.Now, the specifics of the show have been blogged to death, I am sure (some good writeups here and here), but a few themes really struck me:1 - We are all basically experiencing a fairly incredible transition, thanks in no small part to the iPhone. Yes, so-called Smartphones have been around for awhile, but it is clear that the iPhone has captured the imagination of people who would otherwise not care at all about a ...
Read More
Kudos1 Stats

Yo Joe!

It’s G.I. Joe week here at Norton, and to celebrate the upcoming movie , we want to give you stuff! Okay, maybe we’re going to make you work for it. Just a little, though. Here’s the deal: follow us on Twitter (@nortononline) this week. The first 50 new people to follow us after this message is posted will receive (2) free Fandango movie passes. Just for showing up. Really, it’s that easy. Throughout the week, pay attention! We’re going to be asking you some trivia questions about G.I. Joe and if you’re the first one to answer the question correctly, you might get one...
Read More
Kudos0

You thought typos were harmless?

A recent PCMag.com blog post points out that the fake White House website whitehouse.org (no, I won't link you to it) has been hacked and is serving up malware.  Part of the issue here is that many people attempting to go to the government website www.whitehouse.gov will accidentally mistype it as whitehouse.org.  This is a specific case of a very real threat. If you look at the list of the top 500 most popular websites according to Alexa.com.  How many of these domain names are easily misspelled or mistyped?  There is nothing stopping bad people from registering common typos of popular do...
Read More
Kudos0

Your Evolving Digital Life With the Internet of Things

The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things”  it refers to any object you can connect to with the Internet. These "things" include an array of devices and even systems. Either way, the Internet of Things promises to connect more devices than ever before.

Read More
Kudos2 Stats

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats. Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same pers...
Read More
Kudos4 Stats

Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security

Vacation may be a time for rest and relaxation, but your mobile devices likely won’t be getting a break. Now that smartphones and tablets are part of our daily lives, we spend more time than ever staying connected, even while on vacation. Just think of all the selfies you’ll be taking and updates you’ll be posting to your social networks! But, while sharing your vacation moments will be a fun way to capture your R&R, your fun vacation could turn into a bad situation if you choose to use your mobile devices on free public Wi-Fi during your trip. Learn how to be aware of using your mobile devices on public Wi-Fi at key points on your vacation.

Read More
Kudos0

Zero-Impact Meets Zero-Gravity

This past weekend I was joined by an international group of journalists and bloggers for a Zero-Gravity flight to “blast off” the launch of the Norton 2009 security products. This 18-person “band of brothers” boarded the G-Force One in Las Vegas, prepared to float, flip and fly the way orbiting astronauts do. One word describes the experience - awesome. But most people want to know, what in the world does a Zero-G flight have to do with security software?   And the answer is simple…we designed the 2009 Norton products with a mantra of "zero-impact performance".  Meaning, we want our softw...
Read More