• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

The 12 Days of Norton

"We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year." Join us every day for a new Norton tip to keep your holidays merry and bright. A secu ...
Blog Post
Author:
J2K2 Employee
Posted:
12-Dec-2016 | 11:00PM
Comments:
10
Kudos:
0

12 Days of Norton Tips

We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year. ...
Blog Post
Author:
J2K2 Employee
Posted:
21-Nov-2016 | 12:23PM
Kudos:
0

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
09-Aug-2016 | 10:48AM
Kudos:
3

The Risks of Public Wi-Fi

日本語 Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did yo ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
25-Apr-2016 | 3:46PM
Comments:
1
Kudos:
3

Fight Off Malicious Pokemon GO! Apps With The Help Of Norton Mobile Security

日本語 Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK. According to the developer, Pokémon GO! was r ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
18-Jul-2016 | 4:25PM
Kudos:
0

Apple Patches Critical Vulnerability in AirPort Devices

Are your Apple AirPorts suddenly flashing yellow? That’s because Apple has sent out a major update to your AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations. ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
23-Jun-2016 | 4:00PM
Kudos:
0

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices ...
Blog Post
Author:
J2K2 Employee
Posted:
16-Mar-2016 | 11:03AM
Kudos:
1

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Author:
J2K2 Employee
Posted:
25-Mar-2016 | 5:44PM
Kudos:
4

First Mac Ransomware Targets Apple Users

Between March 4th and 5th, 2016, Apple customers were the targets of the first Mac-focused ransomware campaign seen in the wild.  These users downloaded a compromised version of the installer for the Transmission BitTorrent client. The malicious Trojan, k ...
Blog Post
Author:
Solange_Desc Employee
Posted:
07-Mar-2016 | 4:30PM
Kudos:
2

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Author:
J2K2 Employee
Posted:
14-Mar-2016 | 11:41AM
Kudos:
2

Cyber Safety for Women

An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassmen ...
Blog Post
Author:
Posted:
08-Mar-2016 | 3:55PM
Kudos:
3

Ransomware – What Can You Do About It

Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, ...
Blog Post
Author:
Posted:
18-Feb-2016 | 12:20PM
Kudos:
3

What Are Bots?

Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
03-Mar-2016 | 1:33PM
Kudos:
0

Sneaky Android Adware Variant Tricks Users Into Thinking a Different App is Malware

A new, sneaky variant of Android.Mobilespy has been discovered. This malware steals information, and displays advertisements, however it executes it in a different way than most malware. ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
01-Dec-2015 | 3:10PM
Kudos:
1

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

Bug in Apple’s iOS and OSX AirDrop Could Allow Malware to be Installed Silently

A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd.  AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products. AirDrop automatically ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
16-Sep-2015 | 12:59PM
Kudos:
0

Over 225,000 Apple ID Credentials Stolen From Jailbroken iOS Devices

Cybercriminals have reportedly stolen over 225,000 Apple ID account credentials from jailbroken iOS devices, using a type of malware called, “Keyraider”.  The criminals have been using the stolen credentials to make in-app purchases with user accounts. Ke ...
Blog Post
Author:
Solange_Desc Employee
Posted:
31-Aug-2015 | 3:18PM
Kudos:
3

Malware 101: What Is Malware?

Português Español Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
12-Mar-2015 | 2:29PM
Comments:
3
Kudos:
2

Critical New Vulnerability Discovered on MacBooks

A critical new vulnerability that can be used to forcibly install software on MacBooks without the users’ consent or administrator password has been discovered on MacBooks running OS X Yosemite, version 10.10. To exploit this bug, attackers create malware ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
04-Aug-2015 | 3:32PM
Comments:
1
Kudos:
2

Ransomware- When Cybercriminals Hold Your Computer Hostage

Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key. Types of Ransomware Ransomware can present itself ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
10-Aug-2015 | 12:18PM
Kudos:
1

PUA.Wajam minor problem, Excluded by Norton

I opened my "WordPad" to create a document, Norton Security Suite notified me of a low risk problem. I excluded it as Norton recommended. Then I took a closer look at the location. PUA.Wajam (which is some type of browser redirect) was located a ...
Forum Thread
Author:
Posted:
08-Jul-2015 | 2:08AM
Comments:
2
Kudos:
0

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional charac ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
11-Jun-2015 | 2:48PM
Kudos:
2

New Adobe Flash Zero-Day Exploit Discovered in Malvertisements

A new Adobe Zero-day exploit was discovered by Trend Micro on February 2nd, 2015. A Zero-day exploit is when there is an unpatched bug in a software program that allows hackers access to inject malware into your computer.   How Can Cybercriminals Infect M ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
02-Feb-2015 | 11:28AM
Comments:
2
Kudos:
5

Mysterious folders at root of C: 3590F75ABA9E485486C100C1A9D4FF06ZZZ..Z.....ZZZZZ

3590F75ABA9E485486C100C1A9D4FF06ZZZ..Z.....ZZZZZ and 3590F75ABA9E485486C100C1A9D4FF06ZZZZZZ....Z....Z each contains large numbers of folders with names like  Z.........ZZZ..Z   and       ZZZ.Z.ZZ.....ZZZ All the subfolders are dated 11/20/2013   or   12/2 ...
Forum Thread
Author:
Posted:
30-Apr-2015 | 12:19PM
Comments:
1
Kudos:
0

Csrss.exe and conhost.exe without User and Description

I have this conhost and csrss files in my task manager without a User identification and description. I know that the file location of these files is in the system32 folder but when I open its file location it doesn't do anything. Help Me please I ne ...
Forum Thread
Author:
Posted:
27-Apr-2015 | 6:17PM
Comments:
3
Kudos:
0

Warning! New fake Norton Security 2016

The new version of Norton 2016 still not here, but there are new posts on shady websites, which offer a chance to download the new Norton Internet Security 2016. The fake Norton Internet Security 2016 has over 9 thousand downloads, and the exact number of ...
Forum Thread
Author:
Posted:
13-Apr-2015 | 5:06PM
Comments:
3
Kudos:
1
Solved

Malware auf Mac eingefangen trotz Norton?

Guten Tag Ich bin iMac-User und habe den Norton-Internetsecurity-5-Virenschutz. Nun erscheinen bei mir im Google-Chrome-Browser seit dem 4.4.15 ständig Pop-Up-Fenster. Was mich nicht weiter gestört hätte. Als ich dann am 12.4.15 eine Fehlermeldung von Nor ...
Forum Thread
Author:
Posted:
18-Apr-2015 | 4:05AM
Comments:
7
Kudos:
0

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system. ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
03-Nov-2014 | 4:27PM
Comments:
12
Kudos:
5

How to Spot a Fake Android App

简体中文 日本語 Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
18-Aug-2014 | 4:41PM
Kudos:
2

price fountain

Anybody familiar with Price Fountain?  From my searches it is a pop up malware.  I would like to get rid of it.  Full system scans and Power Eraser don't detect it.  Thanks. I need a solution. ...
Forum Thread
Author:
Posted:
22-Mar-2015 | 7:01PM
Comments:
1
Kudos:
0