• Toute la Communauté
    • Toute la Communauté
    • Forums
    • Idées
    • Blogs
Avancé

Rechercher

Résultats de la recherche

The 12 Days of Norton

"We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year." Join us every day for a new Norton tip to keep your holidays merry and bright. A secu ...
Blog Post
Auteur:
J2K2 Employee
Envoyé le:
2016-12-12 | 23:00
Commentaires:
10
Remerciements:
0

12 Days of Norton Tips

We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year. ...
Blog Post
Auteur:
J2K2 Employee
Envoyé le:
2016-11-21 | 12:23
Remerciements:
0

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2016-08-09 | 10:48
Remerciements:
3

The Risks of Public Wi-Fi

日本語 Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did yo ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2016-04-25 | 15:46
Commentaires:
1
Remerciements:
3

Fight Off Malicious Pokemon GO! Apps With The Help Of Norton Mobile Security

日本語 Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK. According to the developer, Pokémon GO! was r ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2016-07-18 | 16:25
Remerciements:
0

Apple Patches Critical Vulnerability in AirPort Devices

Are your Apple AirPorts suddenly flashing yellow? That’s because Apple has sent out a major update to your AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations. ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2016-06-23 | 16:00
Remerciements:
0

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices ...
Blog Post
Auteur:
J2K2 Employee
Envoyé le:
2016-03-16 | 11:03
Remerciements:
1

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Auteur:
J2K2 Employee
Envoyé le:
2016-03-25 | 17:44
Remerciements:
4

First Mac Ransomware Targets Apple Users

Between March 4th and 5th, 2016, Apple customers were the targets of the first Mac-focused ransomware campaign seen in the wild.  These users downloaded a compromised version of the installer for the Transmission BitTorrent client. The malicious Trojan, k ...
Blog Post
Auteur:
Solange_Desc Employee
Envoyé le:
2016-03-07 | 16:30
Remerciements:
2

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Auteur:
J2K2 Employee
Envoyé le:
2016-03-14 | 11:41
Remerciements:
2

Cyber Safety for Women

An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassmen ...
Blog Post
Auteur:
Envoyé le:
2016-03-08 | 15:55
Remerciements:
3

Ransomware – What Can You Do About It

Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, ...
Blog Post
Auteur:
Envoyé le:
2016-02-18 | 12:20
Remerciements:
3

What Are Bots?

Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2016-03-03 | 13:33
Remerciements:
0

Sneaky Android Adware Variant Tricks Users Into Thinking a Different App is Malware

A new, sneaky variant of Android.Mobilespy has been discovered. This malware steals information, and displays advertisements, however it executes it in a different way than most malware. ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-12-01 | 15:10
Remerciements:
1

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-11-18 | 14:27
Remerciements:
1

Bug in Apple’s iOS and OSX AirDrop Could Allow Malware to be Installed Silently

A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd.  AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products. AirDrop automatically ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-09-16 | 12:59
Remerciements:
0

Over 225,000 Apple ID Credentials Stolen From Jailbroken iOS Devices

Cybercriminals have reportedly stolen over 225,000 Apple ID account credentials from jailbroken iOS devices, using a type of malware called, “Keyraider”.  The criminals have been using the stolen credentials to make in-app purchases with user accounts. Ke ...
Blog Post
Auteur:
Solange_Desc Employee
Envoyé le:
2015-08-31 | 15:18
Remerciements:
3

Malware 101: What Is Malware?

Português Español Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-03-12 | 14:29
Commentaires:
3
Remerciements:
2

Critical New Vulnerability Discovered on MacBooks

A critical new vulnerability that can be used to forcibly install software on MacBooks without the users’ consent or administrator password has been discovered on MacBooks running OS X Yosemite, version 10.10. To exploit this bug, attackers create malware ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-08-04 | 15:32
Commentaires:
1
Remerciements:
2

Ransomware- When Cybercriminals Hold Your Computer Hostage

Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key. Types of Ransomware Ransomware can present itself ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-08-10 | 12:18
Remerciements:
1

PUA.Wajam minor problem, Excluded by Norton

I opened my "WordPad" to create a document, Norton Security Suite notified me of a low risk problem. I excluded it as Norton recommended. Then I took a closer look at the location. PUA.Wajam (which is some type of browser redirect) was located a ...
Forum Thread
Auteur:
Envoyé le:
2015-07-08 | 02:08
Commentaires:
2
Remerciements:
0

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional charac ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-06-11 | 14:48
Remerciements:
2

New Adobe Flash Zero-Day Exploit Discovered in Malvertisements

A new Adobe Zero-day exploit was discovered by Trend Micro on February 2nd, 2015. A Zero-day exploit is when there is an unpatched bug in a software program that allows hackers access to inject malware into your computer.   How Can Cybercriminals Infect M ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2015-02-02 | 11:28
Commentaires:
2
Remerciements:
5

Mysterious folders at root of C: 3590F75ABA9E485486C100C1A9D4FF06ZZZ..Z.....ZZZZZ

3590F75ABA9E485486C100C1A9D4FF06ZZZ..Z.....ZZZZZ and 3590F75ABA9E485486C100C1A9D4FF06ZZZZZZ....Z....Z each contains large numbers of folders with names like  Z.........ZZZ..Z   and       ZZZ.Z.ZZ.....ZZZ All the subfolders are dated 11/20/2013   or   12/2 ...
Forum Thread
Auteur:
Envoyé le:
2015-04-30 | 12:19
Commentaires:
1
Remerciements:
0

Csrss.exe and conhost.exe without User and Description

I have this conhost and csrss files in my task manager without a User identification and description. I know that the file location of these files is in the system32 folder but when I open its file location it doesn't do anything. Help Me please I ne ...
Forum Thread
Auteur:
Envoyé le:
2015-04-27 | 18:17
Commentaires:
3
Remerciements:
0

Warning! New fake Norton Security 2016

The new version of Norton 2016 still not here, but there are new posts on shady websites, which offer a chance to download the new Norton Internet Security 2016. The fake Norton Internet Security 2016 has over 9 thousand downloads, and the exact number of ...
Forum Thread
Auteur:
Envoyé le:
2015-04-13 | 17:06
Commentaires:
3
Remerciements:
1
Résolu

Malware auf Mac eingefangen trotz Norton?

Guten Tag Ich bin iMac-User und habe den Norton-Internetsecurity-5-Virenschutz. Nun erscheinen bei mir im Google-Chrome-Browser seit dem 4.4.15 ständig Pop-Up-Fenster. Was mich nicht weiter gestört hätte. Als ich dann am 12.4.15 eine Fehlermeldung von Nor ...
Forum Thread
Auteur:
Envoyé le:
2015-04-18 | 04:05
Commentaires:
7
Remerciements:
0

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system. ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2014-11-03 | 16:27
Commentaires:
12
Remerciements:
5

How to Spot a Fake Android App

简体中文 日本語 Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app ...
Blog Post
Auteur:
Nadia_Kovacs Employee
Envoyé le:
2014-08-18 | 16:41
Remerciements:
2

price fountain

Anybody familiar with Price Fountain?  From my searches it is a pop up malware.  I would like to get rid of it.  Full system scans and Power Eraser don't detect it.  Thanks. I need a solution. ...
Forum Thread
Auteur:
Envoyé le:
2015-03-22 | 19:01
Commentaires:
1
Remerciements:
0