What version of NIS do you use? v1 [Results]
May 21, 2012A year has passed since I published a poll with which I wanted to find out what version of Norton Internet Security visitors uses.
The poll results encouraging, because we can see that users prefer to use the latest versions of software, that are faster and more reliable than previous ones. It's good, because the Norton Internet Security product is being actively developed, and each year the Symantec corporation implements new technologies to ensure the security of users' computers. Thus, using the latest version of the program can be sure that your PC is safe.
Symantec Internet Security Threat Report 2011, Volume 17
Apr 30, 2012Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands of events per second.
In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 47,662 recorded vulnerabilities (spanning more than two decades) from over 15,967 vendors representing over 40,006 products.
Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, a system of more than 5 million decoy accounts; Symantec.cloud and a number of other Symantec security technologies. Skeptic, the Symantec.cloud proprietary heuristic technology is able to detect new and sophisticated targeted threats before reaching customers’ networks. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors, and more than 50 million consumers.
These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report, which gives enterprises and consumers the essential information to secure their systems effectively now and into the future.
Symantec blocked more than 5.5 billion malicious attacks in 2011; an increase of more than 81% from the previous year. This increase was in large part a result of a surge in polymorphic malware attacks, particularly from those found in Web attack kits and socially engineered attacks using email-borne malware. Targeted attacks exploiting zero-day vulnerabilities were potentially the most insidious of these attacks. With a targeted attack, it is almost impossible to know when you are being targeted, as by their very nature they are designed to slip under the radar and evade detection. Unlike these chronic problems, targeted attacks, politically-motivated hacktivist attacks, data breaches and attacks on Certificate Authorities made the headlines in 2011.
SSL (Secure Sockets Layer)
Originally developed by Netscape Communications to allow secure access of a browser to a Web server, Secure Sockets Layer (SSL) has become the accepted standard for Web security. The first version of SSL was never released because of problems regarding protection of credit card transactions on the Web. In 1994, Netscape created SSLv2, which made it possible to keep credit card numbers confidential and also authenticate the Web server with the use of encryption and digital certificates. In 1995, Netscape strengthened the cryptographic algorithms and resolved many of the security problems in SSLv2 with the release of SSLv3. SSLv3 now supports more security algorithms than SSLv2.
Did You Know? Internet Security Threat Report, Volume 17
Learn about the latest threats and security trends covered in the Symantec Internet Security Threat Report (ISTR), a comprehensive source of Internet threat data that provides an overview and analysis of the year in global Internet threat activity.
The Symantec Internet Security Threat Report is one of the most comprehensive sources of Internet threat data in the world. Symantec’s analysts have access to unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The Symantec Internet Security Threat Report gives enterprises and consumers the essential information they need to secure their systems effectively — now, and into the future.
Symantec Internet Security Threat Report Volume 17 Podcast
Listen to Kevin Haley, Director, Security Technology and Response share an overview of the highlights of Symantec’s latest Internet Security Threat Report, Volume 17.
The Symantec Internet Security Threat Report is one of the most comprehensive sources of Internet threat data in the world. Symantec’s analysts have access to unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The Symantec Internet Security Threat Report gives enterprises and consumers the essential information they need to secure their systems effectively — now, and into the future.
Norton Study Calculates Cost of Global Cybercrime: 114ドル Billion Annually
Sep 8, 2011For the first time a Norton study calculates the cost of global cybercrime: 114ドル billion annually. Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional 274ドル billion was lost. With 431 million adult victims globally in the past year and at an annual price of 388ドル billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined (288ドル billion).
According to the Norton Cybercrime Report 2011 more than two thirds of online adults (69 percent) have been a victim of cybercrime in their lifetime. Every second 14 adults become a victim of cybercrime, resulting in more than one million cybercrime victims every day4. For the first time, the Norton Cybercrime Report reveals that 10 percent of adults online have experienced cybercrime on their mobile phone.
What version of NIS do you use? v1
May 3, 2011In connection with the release of beta version of the Norton Internet Security 2012, I would like to know exactly which version of Norton Internet Security you use: 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005 or Norton Internet Security 4.0 for Macintosh. That is why, for (削除) 200 days (削除ここまで) ~1 year on all pages of this blog (right sidebar) you will see a poll with the help of which, we will try to find out the answer to the above question.
Norton Internet Security 2012 beta
Apr 25, 2011A few days ago, Symantec released the 2012 beta version of the Norton Internet Security, which is available for free public download at nis2012beta with a 14-day beta subscription activation key.
The main key features of Norton Internet Security 2012 Beta are:
- Norton Protection System includes 4 layers of rock-solid protection designed to proactively protect against the very latest security threats — so you can do more on your PC without disruptions.
- Customizable Control Center gives you the option to choose your preference between a simplified screen or the traditional detailed view.
- Identity Safe alerts have moved to the Norton Toolbar so there are less interruptions while you are online — but your passwords are still as secure as ever.
- Bandwidth Management limits Norton’s processes and updates when you have limited bandwidth or monthly downloads.
- Download Insight 2.0 now tells you how stable a download is before you put your computer at risk for crashes or other bad things to happen.
- Norton Recovery Tools help remove threats that can be deeply buried in a PC’s operating system.
Security Update 371 for Norton Internet Security
Apr 19, 2011Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 371 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 371 adds coverage for the following vulnerabilities and threats:
- W32.Qakbot Activity — W32.Qakbot is a worm that spreads through network shares and opens a back door on the compromised computer. It may also steal information and download more files on to the compromised computer.
- Fake AV Redirect 19 — Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
- MS Internet Explorer Memory Corruption CVE-2011-1345 2 — A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution.
- MS Word SWF CVE-2011-0611 — Adobe Flash Player is a multimedia application for multiple platforms. Adobe Flash Player is prone to a remote memory-corruption vulnerability. Specifically, the issue is triggered when handling a malicious «.swf» file embedded in a Microsoft Word «.doc» file. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Security Update 370 for Norton Internet Security
Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 370 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 370 provides updated coverage for security threat Fake App Attack: Misleading Application Suspicious Notification.
Security Update 369 for Norton Internet Security
Apr 16, 2011Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 369 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 369 adds coverage for the following vulnerabilities and network security threats:
- Web Attack: Malicious Javascript — Malicious JavaScript when executed will download other exploits on to the machine. This can compromise the machine.
Security Update 368 for Norton Internet Security
Apr 13, 2011Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 368 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 368 adds coverage for the following vulnerabilities and network security threats:
- HTTP Blackhole Toolkit Activity 5 — Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine;
Security Update 367 for Norton Internet Security
Apr 12, 2011Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 367 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 367 adds coverage for the following vulnerabilities and network security threats:
- HTTP MHTML Script Code Injection Vulnerability — The MHTML implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer;
Security Update 366 for Norton Internet Security
Apr 11, 2011Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 366 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 366 adds coverage for the following vulnerabilities and network security threats:
- HTTP Malicious Java Activity 5 — Malicious JAR files can lead to compromise of security of the machine where it is executed;
- Web Attack: Malicious JavaScript Download — Malicious JavaScript when executed will download other exploits on to the machine. This can compromise the machine;
Symantec Internet Security Threat Report 2010, Volume 16
Apr 4, 2011Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyze, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam.
More than 240,000 sensors in more than 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services and Norton™ consumer products, as well as additional third-party data sources.
Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks that provide valuable insight into attacker methods.
Norton Performance & Protection challenge
Mar 19, 2011Norton Internet Security delivers fast and light online threat protection. It guards your PC, network, online activities, and your identity with innovative detection technologies optimized to combat today’s aggressive, rapid-fire attacks. Norton Internet Security makes online shopping, banking, and browsing safer and more convenient than ever.
The improved Norton Protection System features multi-layered security technologies. They work together to provide the comprehensive protection that detects and removes network security threats before they can harm your PC. The Norton Protection System stops online identity theft, viruses, hackers, bots, spyware, Trojan horses, and more without slowing you down or getting in your way.
Norton Reputation Service
Mar 13, 2011Norton Reputation Service technology scrutinizes different attributes of files and applications in real-time to determine if they are safe. Norton Reputation Service instantly checks where files came from and how long they’ve been around to identify and stop new crime-ware faster than other, less sophisticated security software.
This breakthrough technology provides an added layer of protection against crime-ware. It allows Norton Internet Security 2011 to identify and stop new threats faster than less sophisticated protection software.
Security tips to keep you computer protected online
Jan 3, 2011Read about top 10 security tips to keep you computer protected online and learn how to secure your PC from security threats. Scan emails, patch and upgrade security software, backup computer, avoid spam and use latest protection software from Norton.
Network security threats
Dec 14, 2010As you probably know, the main objective of security software is to protect and ensure the safety of information, computer systems or computer networks from theft, vandalism, damage, loss and other potential hazards. Of course, security software is not the only solution to protect a computer system, but in my opinion, namely security software plays a crucial role in securing and maintaining the confidentiality of personal computers.
I think the problem is that unlike the corporate computers, personal computers are not adequately protected against Internet threats, since not all users are good professionals in the field of information security, often ignored the rules of computer security and many other security flaws that are not present in corporate networks. And if, in most instances for corporate computers the main threat are insiders, then for personal computers — Network security threats.
As a rule, to protect personal computer against Network threats helps security software, such as antivirus, anti-spam, firewall, anti-spyware and others — as multi-application security suite or standalone software. And despite the fact that this class of programs provides a malware, spyware, phishing, spam and vulnerability protection, they cannot protect against these threats if the user does not comply with the rules of computer security and ignores the recommendations of experts.
AV-Test release latest security testing results
Aug 17, 2010During the 2nd quarter of 2010 AV-Test have tested 19 security products which ran on Windows 7, in the areas protection, repair and usability. The "Protection" covers static and dynamic malware detection, including real-world 0-Day attack testing. In case of "Repair", AV-Test check the system disinfection and rootkit removal in detail. The "Usability" testing includes the system slow-down caused by the tools and the number of false positives. A product has to reach at least 12 points total in order to receive a certification. 13 products have fulfilled our requirements and received an AV-Test certificate.