As of late I have a what seems to be a new download or product, the name is "Malware Protection 360", it seems to me to be a spoof product that somehow was downloaded on my pc as you cannot right click to get any further info on its publisher, is it Norton, or where it came from...along with that is also "Rocket Tab?" What are these programs as they are running in the background and do not know where they came from?
As I said, we use both the cloud and local protection extensively. I can't quite tell you how much % of protection comes from what, but I can assure you, that we use cloud quite extensively as well.
Btw, what version of Norton are you specifically speaking about? What is the version that you have installed and is there any issues with your product that you would like us to help with?
i have 2 Pcs one with NAV and one with N360
Hi Nathan
You wrote-----------------------------------------------------------------------------------------------------------------------------------------------------
This has not been solved i got sick and tired of waiting !
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sorry you feel that way ...but you were politely asked what versions of the products you were using ? ...You gave the product names ...not the version numbers .
The version numbers are needed in order to give a specific and correct response to your query ......If you open the Norton interface ........then click "Support " ...then .." About " ...you will see the Version number that was requested ...If you still require your query answering..we will be pleased to assist
deleted
The best way to protect a Smart TV and any other connected device that is not a computer or smartphone, is to have a router that has protection for IOT, Internet of Things, devices. One example is the Norton Core router advertised on the right side of these forum pages. You can search for other examples.
But even if you do not have one of these routers, be sure you are using the current features of your current router. Be sure you have changed the router's settings password to a strong password. Use WPA-2 security for your Wifi connections, again with a strong passphrase.
@greenEarth
In short, Norton does have so-called "sandbox technology":
Norton software can figure out if a new file is a threat or not simply by letting it run in a sealed-off virtual machine environment — or “sandbox” — and watching what happens.
Based on the behaviors we see in the sandbox, we can make a determination as to whether that software is trustworthy or not
It doesn’t matter if there are a million variants of a particular threat,... As long as the core behaviours it exhibits are understood to be bad, then we can identify it as being malicious and take steps to block it.
Furthermore, you're one of mal fans, try installing the latest version of VMware/ VirtualBox.
For more info, you may Chat with Norton Support. Thx...
Here's your answer ! Specifically in the article
What if a Norton user encounters a threat that’s so new, it isn’t in Symantec’s database? Antivirus wouldn’t work, because there would be no baseline to compare it to.
This is where the layered approach really starts to pay off. Norton technology is also based on the idea that if you can understand what a file does, you can determine whether or not it’s a threat — and act accordingly.
“When you normally run a piece of software on a computer, it has instructions for what the computer should do,” Blake explains. “If those are malicious instructions, the computer is going to do untrustworthy things. So Norton tries to figure out what the software does without actually running it on your computer.”
There are certain things that malware — say, a botnet, or spyware — does that legitimate applications won’t do. A piece of malware may open up Microsoft Outlook and start sending copies of itself to every single one of your contacts. It may copy itself in the AutoRun section of the Windows registry, ensuring that it will run whenever your computer boots. It may even open up a communication channel without your permission or knowledge, and then automatically start feeding information to an IP address in a foreign country.
And because legitimate programs don’t do these things, Norton software can figure out if a new file is a threat or not simply by letting it run in a sealed-off virtual machine environment — or “sandbox” — and watching what happens. The file in question doesn’t have any way to distinguish between the sandbox and a real, unprotected system, so it does whatever it’s designed to do — all without harming the user’s computer or data.
Here's the full article.
https://au.norton.com/how-we-protect-you/multi-layered-technology